From ef4e7b2165ec317aceca4e58f2a2dee87f9918a5 Mon Sep 17 00:00:00 2001 From: Brendan Coles Date: Sat, 5 Mar 2022 13:24:55 +0000 Subject: [PATCH] post/windows/manage/persistence_exe: Replace IO.read with File.binread --- modules/post/windows/manage/persistence_exe.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/post/windows/manage/persistence_exe.rb b/modules/post/windows/manage/persistence_exe.rb index 13e673d131..59acb4e2f6 100644 --- a/modules/post/windows/manage/persistence_exe.rb +++ b/modules/post/windows/manage/persistence_exe.rb @@ -217,6 +217,6 @@ class MetasploitModule < Msf::Post #------------------------------------------------------------------------------- def create_payload_from_file(exec) print_status("Reading Payload from file #{exec}") - ::IO.read(exec) + File.binread(exec) end end