1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-01-20 20:37:27 +01:00

Update to Mimikatz commit 9347714eb1683b74e2537a100b5014268d27f5f0

This commit is contained in:
OJ 2014-07-08 17:36:13 +10:00
parent 05c968a877
commit 5b387c5bee

View File

@ -64,16 +64,16 @@ BOOL kull_m_file_writeData(PCWCHAR fileName, PBYTE data, DWORD lenght)
if (isBase64Intercept)
{
if (CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64 | CRYPT_STRING_NOCRLF, NULL, &dwBytesWritten))
if (CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64, NULL, &dwBytesWritten))
{
if (base64 = (LPWSTR)LocalAlloc(LPTR, dwBytesWritten * sizeof(wchar_t)))
{
if (reussite = CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64 | CRYPT_STRING_NOCRLF, base64, &dwBytesWritten))
if (reussite = CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64, base64, &dwBytesWritten))
{
kprintf(L"\n===================\nBase64 interception\n===================\n");
for (i = 0; i < dwBytesWritten; i++)
kprintf(L"%c", base64[i]);
kprintf(L"\n===================\n");
kprintf(L"===================\n");
}
LocalFree(base64);
}