forked from p15670423/monkey
Wmi fix, expected return code 0, but it is None
This commit is contained in:
parent
8046cddb8b
commit
06bded65eb
|
@ -104,9 +104,9 @@ class WmiExploiter(HostExploiter):
|
|||
ntpath.split(remote_full_path)[0],
|
||||
None)
|
||||
|
||||
if (0 != result.ProcessId) and (0 == result.ReturnValue):
|
||||
LOG.info("Executed dropper '%s' on remote victim %r (pid=%d, exit_code=%d, cmdline=%r)",
|
||||
remote_full_path, self.host, result.ProcessId, result.ReturnValue, cmdline)
|
||||
if (0 != result.ProcessId) and (not result.ReturnValue):
|
||||
LOG.info("Executed dropper '%s' on remote victim %r (pid=%d, cmdline=%r)",
|
||||
remote_full_path, self.host, result.ProcessId, cmdline)
|
||||
|
||||
self.add_vuln_port(port='unknown')
|
||||
success = True
|
||||
|
|
Loading…
Reference in New Issue