expect 0xC00000D

bug/bundler_fix
zerosum0x0 2017-05-17 23:05:20 -06:00
parent 646ca14375
commit d944bdfab0
1 changed files with 5 additions and 2 deletions

View File

@ -194,8 +194,11 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Receiving response from exploit packet")
code, raw = smb1_get_response(sock)
if code == 0xc000000d #STATUS_INVALID_PARAMETER (0xC000000D)
print_good("ETERNALBLUE overwrite completed successfully (0xC000000D)!")
code_str = "0x" + code.to_i.to_s(16).upcase
if code == 0xc000000d # STATUS_INVALID_PARAMETER (0xC000000D)
print_good("ETERNALBLUE overwrite completed successfully (#{code_str})!")
else
print_warning("ETERNALBLUE overwrite returned unexpected status code (#{code_str})!")
end
# Step 4: Send the payload