diff --git a/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb b/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb index 248f1b8f53..3d2685d75a 100644 --- a/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb +++ b/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb @@ -84,6 +84,7 @@ class Metasploit4 < Msf::Exploit::Remote register_options( [ OptBool.new('TRYUAC', [true, 'Ask victim to start as Administrator', false]), + OptBool.new('AllowPowershellPrompt', [true, 'Allow exploit to try Powershell', false]) ], self.class ) end