From e0fb21c26a22de1a6d3544f2e9c99f770c0280d3 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Mon, 21 Apr 2014 21:57:30 +0200 Subject: [PATCH] Patch for an Issue #673 --- lib/takeover/metasploit.py | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/lib/takeover/metasploit.py b/lib/takeover/metasploit.py index d29a71e37..36fac0120 100644 --- a/lib/takeover/metasploit.py +++ b/lib/takeover/metasploit.py @@ -65,7 +65,16 @@ class Metasploit: self._msfPayload = normalizePath(os.path.join(conf.msfPath, "msfpayload")) if IS_WIN: - _ = normalizePath(os.path.join(conf.msfPath, "..", "scripts", "setenv.bat")) + _ = conf.msfPath + while _: + if os.path.exists(os.path.join(_, "scripts")): + _ = os.path.join(_, "scripts", "setenv.bat") + break + else: + old = _ + _ = normalizePath(os.path.join(_, "..")) + if _ == old: + break self._msfCli = "%s & ruby %s" % (_, self._msfCli) self._msfEncode = "ruby %s" % self._msfEncode self._msfPayload = "%s & ruby %s" % (_, self._msfPayload)