We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent f25e3eb commit 7ae786aCopy full SHA for 7ae786a
modules/exploits/windows/iis/msadc.rb
@@ -332,7 +332,7 @@ def exploit
332
333
# Save these file names for later deletion
334
@exe_cmd_copy = exe_fname
335
- @exe_payload = stager_instance.payload_exe
+ @exe_payload = stager_instance.payload_exe # Grab this info from CmdStagerTFTP
336
337
# Just for good measure, we'll make a quick, direct request for the payload
338
# Using the "start" method doesn't seem to make iis very happy :(
0 commit comments