diff --git a/modules/exploits/windows/local/ms13_053_schlamperei.rb b/modules/exploits/windows/local/ms13_053_schlamperei.rb index 1b8916b7b6..93748a9c31 100644 --- a/modules/exploits/windows/local/ms13_053_schlamperei.rb +++ b/modules/exploits/windows/local/ms13_053_schlamperei.rb @@ -106,7 +106,7 @@ class Metasploit3 < Msf::Exploit::Local process = client.sys.process.open(notepad_process_pid, PROCESS_ALL_ACCESS) print_good("Process #{process.pid} launched.") rescue Rex::Post::Meterpreter::RequestError - print_status("Operation failed. Trying to elevate the current process...") + print_status("Operation failed. Hosting exploit in the current process...") process = client.sys.process.open end