Skip to content

Commit

Permalink
Land #3 from @Meatballs1, more better description
Browse files Browse the repository at this point in the history
  • Loading branch information
Tod Beardsley committed Jul 29, 2013
2 parents 37312f2 + 7801ead commit 9304bbe
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions modules/exploits/windows/misc/psh_web_delivery.rb
Original file line number Diff line number Diff line change
Expand Up @@ -22,9 +22,9 @@ def initialize(info = {})
The main purpose of this module is to quickly establish a session on a target
machine when the attacker has to manually type in the command himself, e.g. RDP
Session, Local Access or maybe Remote Command Exec. This attack vector does not
write to disk so is less likely to trigger AV solutions and will allow to attempt local
privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
write to disk so is less likely to trigger AV solutions and will allow privilege
escalations supplied by Meterpreter. Ensure the payload architecture matches the
target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
},
'License' => MSF_LICENSE,
'Author' =>
Expand Down

0 comments on commit 9304bbe

Please sign in to comment.