File tree Expand file tree Collapse file tree 1 file changed +6
-5
lines changed
modules/exploits/windows/http Expand file tree Collapse file tree 1 file changed +6
-5
lines changed Original file line number Diff line number Diff line change 44##
55
66# This is an example implementation of using the Msf::Exploit::Remote::SMBFileServer module
7- # to perform an arbitrary DLL injection over SMB
7+ # to serve an arbitrary DLL over HTTP
88
99require 'msf/core'
1010
@@ -15,11 +15,12 @@ class Metasploit3 < Msf::Exploit::Remote
1515
1616 def initialize ( info = { } )
1717 super ( update_info ( info ,
18- 'Name' => 'DLL Injection over HTTP ' ,
18+ 'Name' => 'HTTP DLL Server ' ,
1919 'Description' => %q{
20- This is an example implementation of using the SMBFileServer module
21- to perform DLL injection over SMB via an webserver which
22- will arbitrarily load a DLL given as an argument (Yes, these exist IRL).
20+ This is a general-purpose module for exploiting conditions where a HTTP request
21+ triggers a DLL load from a specified SMB share. This module serves payloads as
22+ DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would
23+ trigger the load of the DLL.
2324 } ,
2425 'Author' => [
2526 'Matthew Hall <[email protected] >' ,
You can’t perform that action at this time.
0 commit comments