@@ -80,11 +80,11 @@ def __initVars(self):
8080
8181 self .__msfPayloadsList = {
8282 "windows" : {
83- 1 : ( "Reflective Meterpreter (default)" , "windows/reflectivemeterpreter " ),
84- 2 : ( "Meterpreter" , "windows/meterpreter " ),
83+ 1 : ( "Reflective Meterpreter (default)" , "windows/meterpreter " ),
84+ 2 : ( "PatchUp Meterpreter (only from Metasploit development revision 6742) " , "windows/patchupmeterpreter " ),
8585 3 : ( "Shell" , "windows/shell" ),
86- 4 : ( "Reflective VNC" , "windows/reflectivevncinject " ),
87- 5 : ( "VNC" , "windows/vncinject " ),
86+ 4 : ( "Reflective VNC" , "windows/vncinject " ),
87+ 5 : ( "PatchUp VNC (only from Metasploit development revision 6742) " , "windows/patchupvncinject " ),
8888 },
8989 "linux" : {
9090 1 : ( "Shell" , "linux/x86/shell" ),
@@ -150,7 +150,7 @@ def __skeletonSelection(self, msg, lst=None, maxValue=1, default=1):
150150 if num > maxValue :
151151 maxValue = num
152152
153- if "default" in description :
153+ if "( default) " in description :
154154 default = num
155155
156156 message += "\n [%d] %s" % (num , description )
@@ -198,7 +198,7 @@ def __selectPayload(self, askChurrasco=True):
198198 infoMsg += "'incognito' extension to privilege escalate"
199199 logger .info (infoMsg )
200200
201- __payloadStr = "windows/reflectivemeterpreter "
201+ __payloadStr = "windows/meterpreter "
202202
203203 else :
204204 __payloadStr = self .__skeletonSelection ("payload" , self .__msfPayloadsList )
@@ -239,7 +239,7 @@ def __selectPayload(self, askChurrasco=True):
239239 choice = readInput (message , default = "2" )
240240
241241 if not choice or choice == "2" :
242- __payloadStr = "windows/reflectivemeterpreter "
242+ __payloadStr = "windows/meterpreter "
243243
244244 break
245245
0 commit comments