1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-12-21 05:35:54 +01:00

Fix incorrect comment for the WMI query function

This commit is contained in:
OJ 2014-03-12 06:58:19 +10:00
parent d8f86c1806
commit f7468732ec

View File

@ -8,7 +8,7 @@
#include "wmi_interface.h"
/*!
* @brief Enumerate all the users in AD.
* @brief Execute a WMI query.
* @param remote Pointer to the \c Remote instance.
* @param packet Pointer to the incoming \c Packet instance.
* @returns Indication of success or failure.
@ -35,6 +35,7 @@ DWORD request_wmi_query(Remote *remote, Packet *packet)
{
lpValue = "root\\CIMV2";
}
dprintf("[EXTAPI WMI] Domain: %s", lpValue);
dwResult = to_wide_string(lpValue, &lpwRoot);
if (dwResult != ERROR_SUCCESS)