parent
c81d0ade3f
commit
ca4bcfe62a
|
@ -9,7 +9,6 @@ require 'msf/core/post/common'
|
||||||
|
|
||||||
class MetasploitModule < Msf::Post
|
class MetasploitModule < Msf::Post
|
||||||
|
|
||||||
include Msf::Post::Windows::Priv
|
|
||||||
include Msf::Post::Windows::Registry
|
include Msf::Post::Windows::Registry
|
||||||
include Msf::Post::Common
|
include Msf::Post::Common
|
||||||
|
|
||||||
|
@ -25,21 +24,13 @@ class MetasploitModule < Msf::Post
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
# Run Method for when run command is issued
|
|
||||||
def run
|
def run
|
||||||
print_status("Running module against #{sysinfo['Computer']}")
|
|
||||||
|
|
||||||
if sysinfo['Architecture'] =~ /x64/
|
if sysinfo['Architecture'] =~ /x64/
|
||||||
reg_vals = registry_enumvals('HKLM\\SOFTWARE\\Microsoft\\EMET\\AppSettings',REGISTRY_VIEW_64_BIT)
|
reg_vals = registry_enumvals('HKLM\\SOFTWARE\\Microsoft\\EMET\\AppSettings',REGISTRY_VIEW_64_BIT)
|
||||||
else
|
else
|
||||||
reg_vals = registry_enumvals('HKLM\\SOFTWARE\\Microsoft\\EMET\\AppSettings',REGISTRY_VIEW_32_BIT)
|
reg_vals = registry_enumvals('HKLM\\SOFTWARE\\Microsoft\\EMET\\AppSettings',REGISTRY_VIEW_32_BIT)
|
||||||
end
|
end
|
||||||
|
|
||||||
isadmin = is_admin?
|
|
||||||
|
|
||||||
#a = registry_getvaldata('HKLM\HARDWARE\DESCRIPTION\System','SystemBiosVersion')
|
|
||||||
|
|
||||||
|
|
||||||
t = ""
|
t = ""
|
||||||
|
|
||||||
reg_vals.each do |x|
|
reg_vals.each do |x|
|
||||||
|
|
Loading…
Reference in New Issue