Skip to content

Commit 208e706

Browse files
David MaloneyDavid Maloney
authored andcommitted
Module title fixes
1 parent 81ed0bb commit 208e706

File tree

3 files changed

+4
-3
lines changed

3 files changed

+4
-3
lines changed

lib/msf/core/exploit/winrm.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ def initialize(info = {})
2727
OptString.new('URI', [ true, "The URI of the WinRM service", "/wsman" ]),
2828
OptString.new('USERNAME', [ false, 'A specific username to authenticate as' ]),
2929
OptString.new('PASSWORD', [ false, 'A specific password to authenticate with' ]),
30+
OptString.new('NAMESPACE', [true, 'The WMI namespace to use for queries', '/root/cimv2/'])
3031
], self.class
3132
)
3233

@@ -433,7 +434,7 @@ def winrm_header(data)
433434
def winrm_uri_action(type)
434435
case type
435436
when "wql"
436-
return %q{<w:ResourceURI mustUnderstand="true">http://schemas.microsoft.com/wbem/wsman/1/wmi/root/cimv2/*</w:ResourceURI>
437+
return %Q{<w:ResourceURI mustUnderstand="true">http://schemas.microsoft.com/wbem/wsman/1/wmi#{datastore['NAMSPACE']}*</w:ResourceURI>
437438
<a:Action mustUnderstand="true">http://schemas.xmlsoap.org/ws/2004/09/enumeration/Enumerate</a:Action>}
438439
when "create_shell"
439440
return %q{<w:ResourceURI mustUnderstand="true">http://schemas.microsoft.com/wbem/wsman/1/windows/shell/cmd</w:ResourceURI>

modules/exploits/windows/winrm/winrm_script_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
2222

2323
def initialize(info = {})
2424
super(update_info(info,
25-
'Name' => 'WinRM VBS Remote Code Execution',
25+
'Name' => 'WinRM Script Exec Remote Code Execution',
2626
'Description' => %q{
2727
This module uses valid credentials to login to the WinRM service
2828
and execute a payload. It has two available methods for payload

modules/post/windows/manage/smart_migrate.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
1616

1717
def initialize(info={})
1818
super( update_info( info,
19-
'Name' => 'Windows Manage Process Migration',
19+
'Name' => 'Windows Manage Smart Process Migration',
2020
'Description' => %q{ This module will migrate a Meterpreter session.
2121
It will first attempt to migrate to winlogon.exe . If that fails it will
2222
then look at all of the explorer.exe processes. If there is one that exists

0 commit comments

Comments
 (0)