Skip to content

Commit a849571

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent a23473a commit a849571

File tree

1 file changed

+52
-48
lines changed

1 file changed

+52
-48
lines changed

db/modules_metadata_base.json

Lines changed: 52 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -189454,54 +189454,6 @@
189454189454
"needs_cleanup": null,
189455189455
"actions": []
189456189456
},
189457-
"exploit_windows/local/persistence_image_exec_options": {
189458-
"name": "Windows Silent Process Exit Persistence",
189459-
"fullname": "exploit/windows/local/persistence_image_exec_options",
189460-
"aliases": [],
189461-
"rank": 600,
189462-
"disclosure_date": "2008-06-28",
189463-
"type": "exploit",
189464-
"author": [
189465-
"Mithun Shanbhag",
189466-
"bwatters-r7"
189467-
],
189468-
"description": "Windows allows you to set up a debug process when a process exits.\n This module uploads a payload and declares that it is the debug\n process to launch when a specified process exits.",
189469-
"references": [
189470-
"URL-https://attack.mitre.org/techniques/T1183/",
189471-
"URL-https://blogs.msdn.microsoft.com/mithuns/2010/03/24/image-file-execution-options-ifeo/"
189472-
],
189473-
"platform": "Windows",
189474-
"arch": "",
189475-
"rport": null,
189476-
"autofilter_ports": [],
189477-
"autofilter_services": [],
189478-
"targets": [
189479-
"Automatic"
189480-
],
189481-
"mod_time": "2025-06-23 12:43:46 +0000",
189482-
"path": "/modules/exploits/windows/local/persistence_image_exec_options.rb",
189483-
"is_install_path": true,
189484-
"ref_name": "windows/local/persistence_image_exec_options",
189485-
"check": false,
189486-
"post_auth": false,
189487-
"default_credential": false,
189488-
"notes": {
189489-
"Reliability": [
189490-
"unknown-reliability"
189491-
],
189492-
"Stability": [
189493-
"unknown-stability"
189494-
],
189495-
"SideEffects": [
189496-
"unknown-side-effects"
189497-
]
189498-
},
189499-
"session_types": [
189500-
"meterpreter"
189501-
],
189502-
"needs_cleanup": null,
189503-
"actions": []
189504-
},
189505189457
"exploit_windows/local/persistence_service": {
189506189458
"name": "Windows Persistent Service Installer",
189507189459
"fullname": "exploit/windows/local/persistence_service",
@@ -198475,6 +198427,58 @@
198475198427
"session_types": false,
198476198428
"needs_cleanup": null
198477198429
},
198430+
"exploit_windows/persistence/image_exec_options": {
198431+
"name": "Windows Silent Process Exit Persistence",
198432+
"fullname": "exploit/windows/persistence/image_exec_options",
198433+
"aliases": [
198434+
"exploits/windows/local/persistence_image_exec_options"
198435+
],
198436+
"rank": 600,
198437+
"disclosure_date": "2008-06-28",
198438+
"type": "exploit",
198439+
"author": [
198440+
"Mithun Shanbhag",
198441+
"bwatters-r7"
198442+
],
198443+
"description": "Windows allows you to set up a debug process when a process exits.\n This module uploads a payload and declares that it is the debug\n process to launch when a specified process exits.",
198444+
"references": [
198445+
"ATT&CK-T1183",
198446+
"URL-https://blogs.msdn.microsoft.com/mithuns/2010/03/24/image-file-execution-options-ifeo/"
198447+
],
198448+
"platform": "Windows",
198449+
"arch": "",
198450+
"rport": null,
198451+
"autofilter_ports": [],
198452+
"autofilter_services": [],
198453+
"targets": [
198454+
"Automatic"
198455+
],
198456+
"mod_time": "2025-09-26 15:44:31 +0000",
198457+
"path": "/modules/exploits/windows/persistence/image_exec_options.rb",
198458+
"is_install_path": true,
198459+
"ref_name": "windows/persistence/image_exec_options",
198460+
"check": true,
198461+
"post_auth": false,
198462+
"default_credential": false,
198463+
"notes": {
198464+
"Stability": [
198465+
"crash-safe"
198466+
],
198467+
"Reliability": [
198468+
"repeatable-session",
198469+
"event-dependent"
198470+
],
198471+
"SideEffects": [
198472+
"artifacts-on-disk",
198473+
"config-changes"
198474+
]
198475+
},
198476+
"session_types": [
198477+
"meterpreter"
198478+
],
198479+
"needs_cleanup": null,
198480+
"actions": []
198481+
},
198478198482
"exploit_windows/pop3/seattlelab_pass": {
198479198483
"name": "Seattle Lab Mail 5.5 POP3 Buffer Overflow",
198480198484
"fullname": "exploit/windows/pop3/seattlelab_pass",

0 commit comments

Comments
 (0)