Move to exploit module

bug/bundler_fix
Meatballs 2015-04-19 20:58:20 +01:00
parent 1ee850246a
commit 9fd3d3aa8c
No known key found for this signature in database
GPG Key ID: 5380EAF01F2F8B38
1 changed files with 4 additions and 4 deletions

View File

@ -7,13 +7,13 @@ require 'msf/core'
require 'rex'
require 'zlib'
class Metasploit3 < Msf::Post
class Metasploit3 < Msf::Exploit::Local
def initialize(info={})
super(update_info(info,
'Name' => "Windows Manage Interactive Powershell Session",
'Name' => "Windows Local Interactive Powershell Session",
'Description' => %q{
This module will start a new Interative PowerShell session over a meterpreter session.
This module will start a new Interactive PowerShell session over a meterpreter session.
},
'License' => MSF_LICENSE,
'Platform' => ['win'],
@ -113,7 +113,7 @@ class Metasploit3 < Msf::Post
return [cmd_out, running_pids, open_channels]
end
def run
def exploit
@client = client
if (datastore['LOAD_MODULES'].empty?)
modsall = ''