Skip to content

Commit faea5f7

Browse files
committed
Responded to comments
1 parent 3ead0fd commit faea5f7

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/windows/local/service_permissions.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ def exploit
266266
end
267267

268268
if sysinfo['Architecture'] != payload_arch
269-
print_error('The registry technique will be skipped because the payload architecture does not match the native system architecture')
269+
print_error('The registry technique will be skipped because the payload architecture selected does not match the payload architecture of the session being used in the exploit.')
270270
end
271271
tempexe_name = "#{Rex::Text.rand_text_alpha(rand(6..13))}.exe"
272272

@@ -276,7 +276,7 @@ def exploit
276276

277277
if target.name == 'Exploit CVE-2025-21293'
278278
print_status('Exploiting CVE-2025-21293')
279-
fail_with(Failure::BadConfig, 'To exploit CVE-2025-21293 remotely UAC must be disabled') unless is_uac_enabled?
279+
fail_with(Failure::BadConfig, 'To exploit CVE-2025-21293 through a remote shell UAC must be disabled') if is_uac_enabled?
280280
weak_registry_permissions('Dnscache')
281281
return
282282
end

0 commit comments

Comments
 (0)