mirror of
https://github.com/rapid7/metasploit-payloads
synced 2024-12-21 05:35:54 +01:00
Fix incorrect comment for the WMI query function
This commit is contained in:
parent
d8f86c1806
commit
f7468732ec
@ -8,7 +8,7 @@
|
|||||||
#include "wmi_interface.h"
|
#include "wmi_interface.h"
|
||||||
|
|
||||||
/*!
|
/*!
|
||||||
* @brief Enumerate all the users in AD.
|
* @brief Execute a WMI query.
|
||||||
* @param remote Pointer to the \c Remote instance.
|
* @param remote Pointer to the \c Remote instance.
|
||||||
* @param packet Pointer to the incoming \c Packet instance.
|
* @param packet Pointer to the incoming \c Packet instance.
|
||||||
* @returns Indication of success or failure.
|
* @returns Indication of success or failure.
|
||||||
@ -35,6 +35,7 @@ DWORD request_wmi_query(Remote *remote, Packet *packet)
|
|||||||
{
|
{
|
||||||
lpValue = "root\\CIMV2";
|
lpValue = "root\\CIMV2";
|
||||||
}
|
}
|
||||||
|
|
||||||
dprintf("[EXTAPI WMI] Domain: %s", lpValue);
|
dprintf("[EXTAPI WMI] Domain: %s", lpValue);
|
||||||
dwResult = to_wide_string(lpValue, &lpwRoot);
|
dwResult = to_wide_string(lpValue, &lpwRoot);
|
||||||
if (dwResult != ERROR_SUCCESS)
|
if (dwResult != ERROR_SUCCESS)
|
||||||
|
Loading…
Reference in New Issue
Block a user