We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 0a8fe78 commit 4f4bf9dCopy full SHA for 4f4bf9d
modules/exploits/windows/http/oracle_endeca_exec.rb
@@ -129,7 +129,7 @@ def exploit
129
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first)
130
if command.length > 8000
131
# Windows 2008 Command Prompt Max Length is 8191
132
- fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
+ fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
133
end
134
print_status("#{peer} - Exploiting through Powershell...")
135
execute_command(command)
0 commit comments