diff --git a/modules/exploits/windows/local/applocker_bypass.rb b/modules/exploits/windows/local/applocker_bypass.rb index 4665dd436d..81784fbfde 100644 --- a/modules/exploits/windows/local/applocker_bypass.rb +++ b/modules/exploits/windows/local/applocker_bypass.rb @@ -37,25 +37,18 @@ class MetasploitModule < Msf::Exploit::Local ] )) - register_options([ - OptEnum.new('TECHNIQUE', [true, 'Technique to use to bypass AppLocker', - 'INSTALLUTIL', %w(INSTALLUTIL)])]) end # Run Method for when run command is issued def exploit - if datastore['TECHNIQUE'] == 'INSTALLUTIL' - if payload.arch.first == ARCH_X64 && sysinfo['Architecture'] !~ /64/ - fail_with(Failure::NoTarget, 'The target platform is x86. 64-bit payloads are not supported.') - end + if payload.arch.first == ARCH_X64 && sysinfo['Architecture'] !~ /64/ + fail_with(Failure::NoTarget, 'The target platform is x86. 64-bit payloads are not supported.') end # sysinfo is only on meterpreter sessions print_status("Running module against #{sysinfo['Computer']}") if not sysinfo.nil? - if datastore['TECHNIQUE'] == 'INSTALLUTIL' - execute_installutil - end + execute_installutil end def execute_installutil