Agent: Fix malformed WMI query in WMIExploiter
This commit is contained in:
parent
e76b46c8ca
commit
98f8a5b48a
|
@ -65,7 +65,7 @@ class WmiExploiter(HostExploiter):
|
|||
wmi_connection,
|
||||
"Win32_Process",
|
||||
fields=("Caption",),
|
||||
where="Name='{0}'".format(self.options["dropper_target_path_win_64"]),
|
||||
where=f"Name='{ntpath.split(self.options['dropper_target_path_win_64'])[-1]}'",
|
||||
)
|
||||
if process_list:
|
||||
wmi_connection.close()
|
||||
|
|
Loading…
Reference in New Issue