Skip to content

Commit

Permalink
paylod vs payload
Browse files Browse the repository at this point in the history
  • Loading branch information
C-P authored and C-P committed Mar 27, 2015
1 parent 0a8fe78 commit 4f4bf9d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion modules/exploits/windows/http/oracle_endeca_exec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ def exploit
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first)
if command.length > 8000
# Windows 2008 Command Prompt Max Length is 8191
fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
end
print_status("#{peer} - Exploiting through Powershell...")
execute_command(command)
Expand Down

0 comments on commit 4f4bf9d

Please sign in to comment.