Skip to content

Commit 11e9cca

Browse files
author
Tod Beardsley
committed
Spelling and description touch ups.
1 parent 7b7603a commit 11e9cca

File tree

3 files changed

+7
-9
lines changed

3 files changed

+7
-9
lines changed

modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ def initialize(info={})
1717
super(update_info(info,
1818
'Name' => "Honeywell HSC Remote Deployer ActiveX Remote Code Execution",
1919
'Description' => %q{
20-
This modules exploits a vulnerability found in the Honewell HSC Remote Deployer
20+
This modules exploits a vulnerability found in the Honeywell HSC Remote Deployer
2121
ActiveX. This control can be abused by using the LaunchInstaller() function to
2222
execute an arbitrary HTA from a remote location. This module has been tested
23-
successfully with the HSC Remote Deployer ActiveX installed with HoneyWell EBI
23+
successfully with the HSC Remote Deployer ActiveX installed with Honeywell EBI
2424
R410.1.
2525
},
2626
'License' => MSF_LICENSE,

modules/exploits/windows/misc/psh_web_delivery.rb

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,9 @@ def initialize(info = {})
2222
The main purpose of this module is to quickly establish a session on a target
2323
machine when the attacker has to manually type in the command himself, e.g. RDP
2424
Session, Local Access or maybe Remote Command Exec. This attack vector does not
25-
write to disk so is unlikely to trigger AV solutions and will allow to attempt local
26-
privilege escalations supplied by meterpreter etc. You could also try your luck with
27-
social engineering. Ensure the payload architecture matches the target computer or
28-
use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
25+
write to disk so is less likely to trigger AV solutions and will allow to attempt local
26+
privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
27+
matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
2928
},
3029
'License' => MSF_LICENSE,
3130
'Author' =>

modules/exploits/windows/mysql/mysql_mof.rb

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,8 @@ def initialize(info = {})
2121
'Description' => %q{
2222
This module takes advantage of a file privilege misconfiguration problem
2323
specifically against Windows MySQL servers (due to the use of a .mof file).
24-
This may result in arbitrary code execution under the context of SYSTEM. However,
25-
please note in order to use this module, you must have a valid MySQL account on
26-
the target machine.
24+
This may result in arbitrary code execution under the context of SYSTEM.
25+
This module requires a valid MySQL account on the target machine.
2726
},
2827
'Author' =>
2928
[

0 commit comments

Comments
 (0)