1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-09-04 20:18:27 +02:00

Fix bug in duplicate script. Specifying target by PID should work now.

git-svn-id: file:///home/svn/framework3/trunk@10823 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Matt Weeks 2010-10-26 00:32:50 +00:00
parent e78aa83021
commit da3f263f2f

View File

@ -83,8 +83,6 @@ if client.platform =~ /win32|win64/
server = client.sys.process.open
print_status("Current server process: #{server.name} (#{server.pid})")
target_pid = nil
if ! inject
exe = ::Msf::Util::EXE.to_win32pe(client.framework, raw)