Permalink
Browse files

Land #11215, success

  • Loading branch information...
busterb committed Jan 10, 2019
2 parents aaaca59 + 307cc8c commit 9f8bac59f74dd2ae0ed1cff68521bb714f441874
@@ -104,7 +104,7 @@ def smb_pwn(ip)
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])

# Report output
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(
@@ -72,7 +72,7 @@ def run_host(ip)
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])

unless output.nil?
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(
@@ -136,7 +136,7 @@ def exploit
payload_url = ""
@payload_path = ""
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
print_good("Payload uploaded successfuly")
print_good("Payload uploaded successfully")
else
print_error("Payload upload failed")
return
@@ -85,7 +85,7 @@ def run

ring0_code =
#"\xcc" +
# save registers -- necessary for successfuly recovery
# save registers -- necessary for successful recovery
"\x60" +
# get EPROCESS from ETHREAD
"\x64\xa1\x24\x01\x00\x00" +
@@ -103,7 +103,7 @@ def run
if !recovery_key.nil?
recovery_key = recovery_key[1]
id_key_tmp = id_key_tmp[1]
print_good("Recovery key generated successfuly : #{recovery_key}")
print_good("Recovery key generated successfully : #{recovery_key}")
else
print_error('Recovery Key generation failed')
print_status('No recovery key can be used')

0 comments on commit 9f8bac5

Please sign in to comment.