From bc9065ad42b2b75a6b1a0e2c437e6c003e105501 Mon Sep 17 00:00:00 2001 From: Meatballs1 Date: Tue, 27 Nov 2012 18:12:49 +0000 Subject: [PATCH] Move MSI source and binary location --- data/{post => exploits}/exec_payload.msi | Bin .../exploits/exec_payload_msi}/exec_payload.wxs | 0 .../windows/local/always_install_elevated.rb | 2 +- 3 files changed, 1 insertion(+), 1 deletion(-) rename data/{post => exploits}/exec_payload.msi (100%) rename {data/post/exec_payload_source => external/source/exploits/exec_payload_msi}/exec_payload.wxs (100%) diff --git a/data/post/exec_payload.msi b/data/exploits/exec_payload.msi similarity index 100% rename from data/post/exec_payload.msi rename to data/exploits/exec_payload.msi diff --git a/data/post/exec_payload_source/exec_payload.wxs b/external/source/exploits/exec_payload_msi/exec_payload.wxs similarity index 100% rename from data/post/exec_payload_source/exec_payload.wxs rename to external/source/exploits/exec_payload_msi/exec_payload.wxs diff --git a/modules/exploits/windows/local/always_install_elevated.rb b/modules/exploits/windows/local/always_install_elevated.rb index 193b8b0a62..20b8e90d87 100644 --- a/modules/exploits/windows/local/always_install_elevated.rb +++ b/modules/exploits/windows/local/always_install_elevated.rb @@ -117,7 +117,7 @@ class Metasploit3 < Msf::Exploit::Local @executed = true msi_filename = Rex::Text.rand_text_alpha((rand(8)+6)) + ".msi" - msi_source = ::File.join(Msf::Config.install_root, "data", "post", "exec_payload.msi") + msi_source = ::File.join(Msf::Config.install_root, "data", "exploits", "exec_payload.msi") # Upload MSI @msi_destination = "#{session.fs.file.expand_path("%TEMP%")}\\#{msi_filename}"