@@ -77,9 +77,6 @@ def initialize(info = {})
77
77
OptBool . new ( 'MOF_UPLOAD_METHOD' , [ true , "Use WBEM instead of RPC, ADMIN$ share will be mandatory. ( Not compatible with Vista+ )" , false ] ) ,
78
78
OptBool . new ( 'ALLOW_GUEST' , [ true , "Keep trying if only given guest access" , false ] ) ,
79
79
OptString . new ( 'SERVICE_FILENAME' , [ false , "Filename to to be used on target for the service binary" , nil ] ) ,
80
- OptString . new ( 'SERVICE_DESCRIPTION' , [ false , "Service description to to be used on target for pretty listing" , nil ] ) ,
81
- OptString . new ( 'SERVICE_NAME' , [ false , "Servicename to to be used on target for the service binary and manager" , nil ] ) ,
82
- OptString . new ( 'SERVICE_DISPLAYNAME' , [ false , "Service displayname to to be used on target for the service manager" , nil ] )
83
80
] , self . class )
84
81
end
85
82
@@ -226,7 +223,7 @@ def exploit
226
223
file_location = "\\ \\ 127.0.0.1\\ #{ smbshare } \\ #{ fileprefix } \\ #{ filename } "
227
224
end
228
225
229
- psexec ( file_location , false , servicedescription , servicename , displayname )
226
+ psexec ( file_location , false )
230
227
231
228
unless datastore [ 'SERVICE_PERSIST' ]
232
229
print_status ( "Deleting \\ #{ filename } ..." )
0 commit comments