Fixed check to you know, check.

GSoC/Meterpreter_Web_Console
bwatters-r7 2018-10-04 16:38:35 -05:00
parent ce59964141
commit 9a45c66db4
1 changed files with 3 additions and 1 deletions

View File

@ -107,7 +107,9 @@ class MetasploitModule < Msf::Exploit::Local
my_target = assign_target
print_status("#{my_target['Arch']}")
verify_arch(my_target)
check
if check == Exploit::CheckCode::Safe
fail_with(Failure::NoAccess, 'User does not have SeImpersonate Privilege')
end
if my_target.opts['Arch'] == 'x64'
dll_file_name = 'rottenpotato.x64.dll'
vprint_status("Assigning payload rottenpotato.x64.dll")