diff --git a/modules/exploits/windows/misc/agentxpp_receive_agentx.rb b/modules/exploits/windows/misc/agentxpp_receive_agentx.rb index 163db5bb68..0f57816da4 100644 --- a/modules/exploits/windows/misc/agentxpp_receive_agentx.rb +++ b/modules/exploits/windows/misc/agentxpp_receive_agentx.rb @@ -92,7 +92,7 @@ class Metasploit3 < Msf::Exploit::Remote sock.put(hdr) # Wait to make sure it processed that chunk. - sleep(0.5) + select(nil, nil, nil, 0.5) #print_status("press enter to trigger..."); x = $stdin.gets # Send the rest (smashed!)