We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7bfd814 commit 9ad5b41Copy full SHA for 9ad5b41
modules/exploits/windows/local/cve_2024_30088_authz_basep.rb
@@ -133,7 +133,7 @@ def get_winlogon_handle
133
winlogon_handle = nil
134
135
if results.last['lpExitCode'] == 0
136
- print_good("The exploit was successful, reading SYSTEM token from memory...")
+ print_good('The exploit was successful, reading SYSTEM token from memory...')
137
current_memory = process_handle.memory.read(address, 8)
138
winlogon_handle = current_memory.unpack('Q<').first
139
end
0 commit comments