Skip to content

Commit 0a8fe78

Browse files
C-PC-P
authored andcommitted
paylod vs payload
1 parent 5ba614a commit 0a8fe78

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ def exploit
9898
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, {:remove_comspec => true, :encode_final_payload => true})
9999
if command.length > 8000
100100
# Windows 2008 Command Prompt Max Length is 8191
101-
fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
101+
fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
102102
end
103103
print_status("#{peer} - Exploiting through Powershell...")
104104
exec_bar(datastore['CMDPATH'], command, "\x00")

0 commit comments

Comments
 (0)