We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 2a6258b commit d396be9Copy full SHA for d396be9
modules/exploits/windows/local/bypassuac_injection.rb
@@ -181,13 +181,13 @@ def spawn_inject_proc
181
windir = expand_path("%WINDIR%").strip
182
print_status("Spawning process with Windows Publisher Certificate, to inject into...")
183
cmd = "#{windir}\\System32\\notepad.exe"
184
- proc = client.sys.process.execute(cmd, nil, {'Hidden' => true })
+ pid = cmd_exec_get_pid(cmd)
185
186
- if proc.nil? or proc.pid.nil?
+ unless pid
187
fail_with(Exploit::Failure::Unknown, "Spawning Process failed...")
188
end
189
190
- proc.pid
+ pid
191
192
193
0 commit comments