diff --git a/modules/exploits/windows/local/bypassuac_sluihijack.rb b/modules/exploits/windows/local/bypassuac_sluihijack.rb index 3e92cd44de..c703525342 100644 --- a/modules/exploits/windows/local/bypassuac_sluihijack.rb +++ b/modules/exploits/windows/local/bypassuac_sluihijack.rb @@ -182,7 +182,7 @@ class MetasploitModule < Msf::Exploit::Local unless check == CheckCode::Appears fail_with(Failure::NotVulnerable, "Target is not vulnerable.") end - + # Check if you are an admin vprint_status('Checking admin status...') admin_group = is_in_admin_group? @@ -191,7 +191,7 @@ class MetasploitModule < Msf::Exploit::Local end fail_with(Failure::None, 'Already in elevated state') if is_admin? || is_system? - + print_status('UAC is Enabled, checking level...') if admin_group.nil? print_error('Either whoami is not there or failed to execute')