We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 44cdc0a commit 555140bCopy full SHA for 555140b
modules/exploits/windows/smb/psexec_psh.rb
@@ -74,6 +74,10 @@ def initialize(info = {})
74
def exploit
75
command = cmd_psh_payload(payload.encoded)
76
77
+ if datastore['PERSIST'] and not datastore['DisablePayloadHandler']
78
+ print_warning("You probably want to DisablePayloadHandler and use exploit/multi/handler with the PERSIST option.")
79
+ end
80
+
81
#Try and authenticate with given credentials
82
if connect
83
begin
0 commit comments