We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent f3e94d2 commit 8520cbfCopy full SHA for 8520cbf
modules/exploits/windows/local/bypassuac.rb
@@ -36,15 +36,13 @@ def initialize(info={})
36
'Platform' => [ 'windows' ],
37
'SessionTypes' => [ 'meterpreter' ],
38
'Targets' => [ [ 'Windows', {} ] ],
39
+ 'DefaultTarget' => 0,
40
'References' => [
41
[ 'URL', ' http://www.trustedsec.com/december-2010/bypass-windows-uac/' ]
42
],
43
'DisclosureDate'=> "Dec 31, 2010"
44
))
45
- register_options([
46
- ])
47
-
48
end
49
50
def exploit
@@ -54,7 +52,6 @@ def exploit
54
52
# Verify use against Vista+
55
53
#
56
vuln = false
57
- sysinfo = session.sys.config.sysinfo
58
winver = sysinfo["OS"]
59
affected = [ 'Windows Vista', 'Windows 7', 'Windows 2008' ]
60
affected.each { |v|
0 commit comments