mirror of
https://github.com/rapid7/metasploit-payloads
synced 2025-01-20 20:37:27 +01:00
Update to Mimikatz commit 9347714eb1683b74e2537a100b5014268d27f5f0
This commit is contained in:
parent
05c968a877
commit
5b387c5bee
@ -64,16 +64,16 @@ BOOL kull_m_file_writeData(PCWCHAR fileName, PBYTE data, DWORD lenght)
|
||||
|
||||
if (isBase64Intercept)
|
||||
{
|
||||
if (CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64 | CRYPT_STRING_NOCRLF, NULL, &dwBytesWritten))
|
||||
if (CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64, NULL, &dwBytesWritten))
|
||||
{
|
||||
if (base64 = (LPWSTR)LocalAlloc(LPTR, dwBytesWritten * sizeof(wchar_t)))
|
||||
{
|
||||
if (reussite = CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64 | CRYPT_STRING_NOCRLF, base64, &dwBytesWritten))
|
||||
if (reussite = CryptBinaryToString(data, lenght, CRYPT_STRING_BASE64, base64, &dwBytesWritten))
|
||||
{
|
||||
kprintf(L"\n===================\nBase64 interception\n===================\n");
|
||||
for (i = 0; i < dwBytesWritten; i++)
|
||||
kprintf(L"%c", base64[i]);
|
||||
kprintf(L"\n===================\n");
|
||||
kprintf(L"===================\n");
|
||||
}
|
||||
LocalFree(base64);
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user