1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-07-18 18:31:41 +02:00

Land #16885, move msflag.ps1 to /data/post/...

This PR effectively runs the following command
mv scripts/ps/msflag.ps1 data/post/powershell/msflag.ps1
This commit is contained in:
Jack Heysel 2022-08-12 14:33:20 -04:00
commit aac8ecbfe6
No known key found for this signature in database
GPG Key ID: D373F2C24A2A1E70
4 changed files with 7 additions and 8 deletions

View File

@ -0,0 +1,2 @@
$someText = "Hello!" ; $someText > "C:\flag.txt"

View File

@ -46,7 +46,7 @@ class MetasploitModule < Msf::Post
register_options(
[
OptPath.new('SCRIPT', [true, 'Path to the local PS script', ::File.join(Msf::Config.install_root, "scripts", "ps", "msflag.ps1") ]),
OptPath.new('SCRIPT', [true, 'Path to the local PS script', ::File.join(Msf::Config.data_directory, 'post', 'powershell', 'msflag.ps1') ]),
]
)

View File

@ -10,8 +10,8 @@ class MetasploitModule < Msf::Post
super(update_info(info,
'Name' => "Load Scripts Into PowerShell Session",
'Description' => %q{
This module will download and execute one or more PowerShell script
s over a present powershell session.
This module will download and execute one or more PowerShell scripts
over a present powershell session.
Setting VERBOSE to true will show the stager results.
},
'License' => MSF_LICENSE,
@ -25,10 +25,9 @@ class MetasploitModule < Msf::Post
register_options(
[
OptPath.new( 'SCRIPT', [false, 'Path to the local PS script', ::File.join(Msf::Config.install_root, "scripts", "ps", "msflag.ps1") ]),
OptPath.new( 'FOLDER', [false, 'Path to a local folder of PS scripts'])
OptPath.new( 'SCRIPT', [false, 'Path to the local PS script', ::File.join(Msf::Config.data_directory, 'post', 'powershell', 'msflag.ps1') ]),
OptPath.new( 'FOLDER', [false, 'Path to a local folder of PS scripts'])
])
end
def run

View File

@ -1,2 +0,0 @@
$someText = "Hello from Metasploit!" ; $someText > "C:\flag.txt"