@@ -80,11 +80,11 @@ def __initVars(self):
80
80
81
81
self .__msfPayloadsList = {
82
82
"windows" : {
83
- 1 : ( "Reflective Meterpreter (default)" , "windows/reflectivemeterpreter " ),
84
- 2 : ( "Meterpreter" , "windows/meterpreter " ),
83
+ 1 : ( "Reflective Meterpreter (default)" , "windows/meterpreter " ),
84
+ 2 : ( "PatchUp Meterpreter (only from Metasploit development revision 6742) " , "windows/patchupmeterpreter " ),
85
85
3 : ( "Shell" , "windows/shell" ),
86
- 4 : ( "Reflective VNC" , "windows/reflectivevncinject " ),
87
- 5 : ( "VNC" , "windows/vncinject " ),
86
+ 4 : ( "Reflective VNC" , "windows/vncinject " ),
87
+ 5 : ( "PatchUp VNC (only from Metasploit development revision 6742) " , "windows/patchupvncinject " ),
88
88
},
89
89
"linux" : {
90
90
1 : ( "Shell" , "linux/x86/shell" ),
@@ -150,7 +150,7 @@ def __skeletonSelection(self, msg, lst=None, maxValue=1, default=1):
150
150
if num > maxValue :
151
151
maxValue = num
152
152
153
- if "default" in description :
153
+ if "( default) " in description :
154
154
default = num
155
155
156
156
message += "\n [%d] %s" % (num , description )
@@ -198,7 +198,7 @@ def __selectPayload(self, askChurrasco=True):
198
198
infoMsg += "'incognito' extension to privilege escalate"
199
199
logger .info (infoMsg )
200
200
201
- __payloadStr = "windows/reflectivemeterpreter "
201
+ __payloadStr = "windows/meterpreter "
202
202
203
203
else :
204
204
__payloadStr = self .__skeletonSelection ("payload" , self .__msfPayloadsList )
@@ -239,7 +239,7 @@ def __selectPayload(self, askChurrasco=True):
239
239
choice = readInput (message , default = "2" )
240
240
241
241
if not choice or choice == "2" :
242
- __payloadStr = "windows/reflectivemeterpreter "
242
+ __payloadStr = "windows/meterpreter "
243
243
244
244
break
245
245
0 commit comments