File tree Expand file tree Collapse file tree 3 files changed +12
-9
lines changed
Expand file tree Collapse file tree 3 files changed +12
-9
lines changed Original file line number Diff line number Diff line change @@ -9,13 +9,13 @@ class MetasploitModule < Msf::Auxiliary
99
1010 def initialize
1111 super (
12- 'Name' => 'PXE Boot Exploit Server' ,
12+ 'Name' => 'PXE Boot Server' ,
1313 'Description' => %q{
1414 This module provides a PXE server, running a DHCP and TFTP server.
15- The default configuration loads a linux kernel and initrd into memory that
15+ The default configuration loads a Linux kernel and initrd into memory that
1616 reads the hard drive; placing a payload to install metsvc, disable the
1717 firewall, and add a new user metasploit on any Windows partition seen,
18- and add a uid 0 user with username and password metasploit to any linux
18+ and add a uid 0 user with username and password metasploit to any Linux
1919 partition seen. The windows user will have the password p@SSw0rd!123456
2020 (in case of complexity requirements) and will be added to the administrators
2121 group.
Original file line number Diff line number Diff line change @@ -11,13 +11,15 @@ class MetasploitModule < Msf::Exploit::Remote
1111
1212 def initialize
1313 super (
14- 'Name' => 'PXE Exploit Server' ,
14+ 'Name' => 'PXE Boot Server' ,
1515 'Description' => %q{
1616 This module provides a PXE server, running a DHCP and TFTP server.
17- The default configuration loads a linux kernel and initrd into memory that
17+ The default configuration loads a Linux kernel and initrd into memory that
1818 reads the hard drive; placing the payload on the hard drive of any Windows
1919 partition seen.
2020
21+ See auxiliary/server/pxe_boot for a version to deliver a more payloads.
22+
2123 Note: the displayed IP address of a target is the address this DHCP server
2224 handed out, not the "normal" IP address the host uses.
2325 } ,
Original file line number Diff line number Diff line change @@ -8,18 +8,19 @@ class MetasploitModule < Msf::Post
88
99 def initialize
1010 super (
11- 'Name' => 'Windows Manage PXE Exploit Server' ,
11+ 'Name' => 'Windows Manage PXE Boot Server' ,
1212 'Description' => %q{
1313 This module provides a PXE server, running a DHCP and TFTP server.
14- The default configuration loads a linux kernel and initrd into memory that
14+ The default configuration loads a Linux kernel and initrd into memory that
1515 reads the hard drive; placing a payload to install metsvc, disable the
1616 firewall, and add a new user metasploit on any Windows partition seen,
17- and add a uid 0 user with username and password metasploit to any linux
17+ and add a uid 0 user with username and password metasploit to any Linux
1818 partition seen. The windows user will have the password p@SSw0rd!123456
1919 (in case of complexity requirements) and will be added to the administrators
2020 group.
2121
22- See exploit/windows/misc/pxesploit for a version to deliver a specific payload.
22+ See exploit/windows/local/pxe_boot for a version to deliver a specific Windows payload.
23+ See auxiliary/server/pxe_boot for a version to deliver a more payloads, including non-Windows.
2324
2425 Note: the displayed IP address of a target is the address this DHCP server
2526 handed out, not the "normal" IP address the host uses.
You can’t perform that action at this time.
0 commit comments