File tree Expand file tree Collapse file tree 3 files changed +7
-9
lines changed Expand file tree Collapse file tree 3 files changed +7
-9
lines changed Original file line number Diff line number Diff line change @@ -17,10 +17,10 @@ def initialize(info={})
17
17
super ( update_info ( info ,
18
18
'Name' => "Honeywell HSC Remote Deployer ActiveX Remote Code Execution" ,
19
19
'Description' => %q{
20
- This modules exploits a vulnerability found in the Honewell HSC Remote Deployer
20
+ This modules exploits a vulnerability found in the Honeywell HSC Remote Deployer
21
21
ActiveX. This control can be abused by using the LaunchInstaller() function to
22
22
execute an arbitrary HTA from a remote location. This module has been tested
23
- successfully with the HSC Remote Deployer ActiveX installed with HoneyWell EBI
23
+ successfully with the HSC Remote Deployer ActiveX installed with Honeywell EBI
24
24
R410.1.
25
25
} ,
26
26
'License' => MSF_LICENSE ,
Original file line number Diff line number Diff line change @@ -22,10 +22,9 @@ def initialize(info = {})
22
22
The main purpose of this module is to quickly establish a session on a target
23
23
machine when the attacker has to manually type in the command himself, e.g. RDP
24
24
Session, Local Access or maybe Remote Command Exec. This attack vector does not
25
- write to disk so is unlikely to trigger AV solutions and will allow to attempt local
26
- privilege escalations supplied by meterpreter etc. You could also try your luck with
27
- social engineering. Ensure the payload architecture matches the target computer or
28
- use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
25
+ write to disk so is less likely to trigger AV solutions and will allow to attempt local
26
+ privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
27
+ matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
29
28
} ,
30
29
'License' => MSF_LICENSE ,
31
30
'Author' =>
Original file line number Diff line number Diff line change @@ -21,9 +21,8 @@ def initialize(info = {})
21
21
'Description' => %q{
22
22
This module takes advantage of a file privilege misconfiguration problem
23
23
specifically against Windows MySQL servers (due to the use of a .mof file).
24
- This may result in arbitrary code execution under the context of SYSTEM. However,
25
- please note in order to use this module, you must have a valid MySQL account on
26
- the target machine.
24
+ This may result in arbitrary code execution under the context of SYSTEM.
25
+ This module requires a valid MySQL account on the target machine.
27
26
} ,
28
27
'Author' =>
29
28
[
You can’t perform that action at this time.
0 commit comments