File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/exploits/windows/local Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -22,7 +22,7 @@ def initialize(info={})
22
22
This module abuses the Capcom.sys kernel driver's function that allows for an
23
23
arbitrary function to be executed in the kernel from user land. This function
24
24
purposely disables SMEP prior to invoking a function given by the caller.
25
- This has been tested on Windows 7 x64.
25
+ This has been tested on Windows 7, 8.1 and Windows 10 ( x64) .
26
26
} ,
27
27
'License' => MSF_LICENSE ,
28
28
'Author' => [
@@ -36,7 +36,7 @@ def initialize(info={})
36
36
'EXITFUNC' => 'thread' ,
37
37
} ,
38
38
'Targets' => [
39
- [ 'Windows x64 (<= 8 )' , { 'Arch' => ARCH_X86_64 } ]
39
+ [ 'Windows x64 (<= 10 )' , { 'Arch' => ARCH_X86_64 } ]
40
40
] ,
41
41
'Payload' => {
42
42
'Space' => 4096 ,
@@ -51,7 +51,7 @@ def initialize(info={})
51
51
end
52
52
53
53
def check
54
- if sysinfo [ 'OS' ] !~ /windows (7|8)/i
54
+ if sysinfo [ 'OS' ] !~ /windows (7|8|10 )/i
55
55
return Exploit ::CheckCode ::Unknown
56
56
end
57
57
You can’t perform that action at this time.
0 commit comments