diff --git a/modules/exploits/multi/misc/bmc_patrol_cmd_exec.rb b/modules/exploits/multi/misc/bmc_patrol_cmd_exec.rb index ce48f96b02..599d911eed 100644 --- a/modules/exploits/multi/misc/bmc_patrol_cmd_exec.rb +++ b/modules/exploits/multi/misc/bmc_patrol_cmd_exec.rb @@ -144,7 +144,7 @@ class MetasploitModule < Msf::Exploit::Remote of the provided user is correct. This also means if the software is running on a domain controller, it can be used to escalate from a normal domain user to domain admin as SYSTEM on a DC is DA. **WARNING** The windows version of this exploit uses - powershell to execute the payload. The powershell version tends to timeout on + powershell to execute the payload. The powershell version tends to timeout on the first run so it may take multiple tries. }, 'License' => MSF_LICENSE,