Skip to content

Commit f264919

Browse files
committed
PXE: Naming consistency
1 parent 0b445cd commit f264919

File tree

3 files changed

+18
-9
lines changed

3 files changed

+18
-9
lines changed
Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,18 @@
66
class MetasploitModule < Msf::Auxiliary
77
include Msf::Exploit::Remote::TFTPServer
88
include Msf::Auxiliary::Report
9+
include Msf::Module::Deprecated
10+
moved_from 'auxiliary/server/pxeexploit'
911

1012
def initialize
1113
super(
12-
'Name' => 'PXE Boot Exploit Server',
14+
'Name' => 'PXE Boot Server',
1315
'Description' => %q{
1416
This module provides a PXE server, running a DHCP and TFTP server.
15-
The default configuration loads a linux kernel and initrd into memory that
17+
The default configuration loads a Linux kernel and initrd into memory that
1618
reads the hard drive; placing a payload to install metsvc, disable the
1719
firewall, and add a new user metasploit on any Windows partition seen,
18-
and add a uid 0 user with username and password metasploit to any linux
20+
and add a uid 0 user with username and password metasploit to any Linux
1921
partition seen. The windows user will have the password p@SSw0rd!123456
2022
(in case of complexity requirements) and will be added to the administrators
2123
group.

modules/exploits/windows/local/pxeexploit.rb renamed to modules/exploits/windows/local/pxe_boot.rb

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,20 @@ class MetasploitModule < Msf::Exploit::Remote
88

99
include Msf::Exploit::Remote::TFTPServer
1010
include Msf::Auxiliary::Report
11+
include Msf::Module::Deprecated
12+
moved_from 'exploits/windows/local/pxeexploit'
1113

1214
def initialize
1315
super(
14-
'Name' => 'PXE Exploit Server',
16+
'Name' => 'PXE Boot Server',
1517
'Description' => %q{
1618
This module provides a PXE server, running a DHCP and TFTP server.
17-
The default configuration loads a linux kernel and initrd into memory that
19+
The default configuration loads a Linux kernel and initrd into memory that
1820
reads the hard drive; placing the payload on the hard drive of any Windows
1921
partition seen.
2022
23+
See auxiliary/server/pxe_boot for a version to deliver a more payloads.
24+
2125
Note: the displayed IP address of a target is the address this DHCP server
2226
handed out, not the "normal" IP address the host uses.
2327
},
Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,24 @@
55

66
class MetasploitModule < Msf::Post
77
include Msf::Auxiliary::Report
8+
include Msf::Module::Deprecated
9+
moved_from 'post/windows/manage/pxeexploit'
810

911
def initialize
1012
super(
11-
'Name' => 'Windows Manage PXE Exploit Server',
13+
'Name' => 'Windows Manage PXE Boot Server',
1214
'Description' => %q{
1315
This module provides a PXE server, running a DHCP and TFTP server.
14-
The default configuration loads a linux kernel and initrd into memory that
16+
The default configuration loads a Linux kernel and initrd into memory that
1517
reads the hard drive; placing a payload to install metsvc, disable the
1618
firewall, and add a new user metasploit on any Windows partition seen,
17-
and add a uid 0 user with username and password metasploit to any linux
19+
and add a uid 0 user with username and password metasploit to any Linux
1820
partition seen. The windows user will have the password p@SSw0rd!123456
1921
(in case of complexity requirements) and will be added to the administrators
2022
group.
2123
22-
See exploit/windows/misc/pxesploit for a version to deliver a specific payload.
24+
See exploit/windows/local/pxe_boot for a version to deliver a specific Windows payload.
25+
See auxiliary/server/pxe_boot for a version to deliver a more payloads, including non-Windows.
2326
2427
Note: the displayed IP address of a target is the address this DHCP server
2528
handed out, not the "normal" IP address the host uses.

0 commit comments

Comments
 (0)