Skip to content

Commit 7932b5d

Browse files
committed
PXE: Naming consistency
1 parent 75819d7 commit 7932b5d

File tree

3 files changed

+12
-9
lines changed

3 files changed

+12
-9
lines changed
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ class MetasploitModule < Msf::Auxiliary
99

1010
def initialize
1111
super(
12-
'Name' => 'PXE Boot Exploit Server',
12+
'Name' => 'PXE Boot Server',
1313
'Description' => %q{
1414
This module provides a PXE server, running a DHCP and TFTP server.
15-
The default configuration loads a linux kernel and initrd into memory that
15+
The default configuration loads a Linux kernel and initrd into memory that
1616
reads the hard drive; placing a payload to install metsvc, disable the
1717
firewall, and add a new user metasploit on any Windows partition seen,
18-
and add a uid 0 user with username and password metasploit to any linux
18+
and add a uid 0 user with username and password metasploit to any Linux
1919
partition seen. The windows user will have the password p@SSw0rd!123456
2020
(in case of complexity requirements) and will be added to the administrators
2121
group.

modules/exploits/windows/local/pxeexploit.rb renamed to modules/exploits/windows/local/pxe_boot.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,15 @@ class MetasploitModule < Msf::Exploit::Remote
1111

1212
def initialize
1313
super(
14-
'Name' => 'PXE Exploit Server',
14+
'Name' => 'PXE Boot Server',
1515
'Description' => %q{
1616
This module provides a PXE server, running a DHCP and TFTP server.
17-
The default configuration loads a linux kernel and initrd into memory that
17+
The default configuration loads a Linux kernel and initrd into memory that
1818
reads the hard drive; placing the payload on the hard drive of any Windows
1919
partition seen.
2020
21+
See auxiliary/server/pxe_boot for a version to deliver a more payloads.
22+
2123
Note: the displayed IP address of a target is the address this DHCP server
2224
handed out, not the "normal" IP address the host uses.
2325
},
Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,19 @@ class MetasploitModule < Msf::Post
88

99
def initialize
1010
super(
11-
'Name' => 'Windows Manage PXE Exploit Server',
11+
'Name' => 'Windows Manage PXE Boot Server',
1212
'Description' => %q{
1313
This module provides a PXE server, running a DHCP and TFTP server.
14-
The default configuration loads a linux kernel and initrd into memory that
14+
The default configuration loads a Linux kernel and initrd into memory that
1515
reads the hard drive; placing a payload to install metsvc, disable the
1616
firewall, and add a new user metasploit on any Windows partition seen,
17-
and add a uid 0 user with username and password metasploit to any linux
17+
and add a uid 0 user with username and password metasploit to any Linux
1818
partition seen. The windows user will have the password p@SSw0rd!123456
1919
(in case of complexity requirements) and will be added to the administrators
2020
group.
2121
22-
See exploit/windows/misc/pxesploit for a version to deliver a specific payload.
22+
See exploit/windows/local/pxe_boot for a version to deliver a specific Windows payload.
23+
See auxiliary/server/pxe_boot for a version to deliver a more payloads, including non-Windows.
2324
2425
Note: the displayed IP address of a target is the address this DHCP server
2526
handed out, not the "normal" IP address the host uses.

0 commit comments

Comments
 (0)