diff --git a/modules/exploits/windows/local/ms16_075_reflection.rb b/modules/exploits/windows/local/ms16_075_reflection.rb index c05d328767..241016f004 100644 --- a/modules/exploits/windows/local/ms16_075_reflection.rb +++ b/modules/exploits/windows/local/ms16_075_reflection.rb @@ -107,7 +107,9 @@ class MetasploitModule < Msf::Exploit::Local my_target = assign_target print_status("#{my_target['Arch']}") verify_arch(my_target) - check + if check == Exploit::CheckCode::Safe + fail_with(Failure::NoAccess, 'User does not have SeImpersonate Privilege') + end if my_target.opts['Arch'] == 'x64' dll_file_name = 'rottenpotato.x64.dll' vprint_status("Assigning payload rottenpotato.x64.dll")