Skip to content

Commit 4f4bf9d

Browse files
C-PC-P
authored andcommitted
paylod vs payload
1 parent 0a8fe78 commit 4f4bf9d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/http/oracle_endeca_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ def exploit
129129
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first)
130130
if command.length > 8000
131131
# Windows 2008 Command Prompt Max Length is 8191
132-
fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
132+
fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
133133
end
134134
print_status("#{peer} - Exploiting through Powershell...")
135135
execute_command(command)

0 commit comments

Comments
 (0)