From d78f2e7bbda0f85d65c8790b9a1300a70046e97e Mon Sep 17 00:00:00 2001 From: Brent Cook Date: Wed, 23 May 2018 14:14:40 -0500 Subject: [PATCH] Land #10087, remove unused option from applocker bypass --- modules/exploits/windows/local/applocker_bypass.rb | 13 +++---------- 1 file changed, 3 insertions(+), 10 deletions(-) diff --git a/modules/exploits/windows/local/applocker_bypass.rb b/modules/exploits/windows/local/applocker_bypass.rb index 4665dd436d..81784fbfde 100644 --- a/modules/exploits/windows/local/applocker_bypass.rb +++ b/modules/exploits/windows/local/applocker_bypass.rb @@ -37,25 +37,18 @@ class MetasploitModule < Msf::Exploit::Local ] )) - register_options([ - OptEnum.new('TECHNIQUE', [true, 'Technique to use to bypass AppLocker', - 'INSTALLUTIL', %w(INSTALLUTIL)])]) end # Run Method for when run command is issued def exploit - if datastore['TECHNIQUE'] == 'INSTALLUTIL' - if payload.arch.first == ARCH_X64 && sysinfo['Architecture'] !~ /64/ - fail_with(Failure::NoTarget, 'The target platform is x86. 64-bit payloads are not supported.') - end + if payload.arch.first == ARCH_X64 && sysinfo['Architecture'] !~ /64/ + fail_with(Failure::NoTarget, 'The target platform is x86. 64-bit payloads are not supported.') end # sysinfo is only on meterpreter sessions print_status("Running module against #{sysinfo['Computer']}") if not sysinfo.nil? - if datastore['TECHNIQUE'] == 'INSTALLUTIL' - execute_installutil - end + execute_installutil end def execute_installutil