We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 3b8fd64 + 06d1971 commit 4f04791Copy full SHA for 4f04791
modules/exploits/windows/local/unquoted_service_path.rb
@@ -170,7 +170,12 @@ def exploit
170
print_status(" Placing #{exe_path} for #{svc_name}")
171
exe = @svc_exes[svc_name] ||= generate_payload_exe_service({ servicename: svc_name })
172
print_status(" Attempting to write #{exe.length} bytes to #{exe_path}...")
173
- write_file(exe_path, exe)
+
174
+ unless write_file(exe_path, exe)
175
+ print_error("#{exe_path} could not be written")
176
+ next
177
+ end
178
179
print_good ' Successfully wrote payload'
180
register_file_for_cleanup(exe_path)
181
0 commit comments