We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent aeb8378 commit 519eb0cCopy full SHA for 519eb0c
lib/msf/core/exploit/winrm.rb
@@ -17,7 +17,7 @@ module Exploit::Remote::WinRM
17
NTLM_CONST ||= Rex::Proto::NTLM::Constants
18
NTLM_UTILS ||= Rex::Proto::NTLM::Utils
19
NTLM_XCEPT ||= Rex::Proto::NTLM::Exceptions
20
-
+
21
def initialize(info = {})
22
super
23
register_options(
@@ -68,7 +68,7 @@ def winrm_run_cmd(cmd, timeout=20)
68
end
69
unless resp.code == 200
70
print_error "Got unexpected response: \n #{resp.to_s}"
71
- retval == resp.code || 0
+ retval = resp.code || 0
72
return retval
73
74
shell_id = winrm_get_shell_id(resp)
0 commit comments