Skip to content

Commit 3391699

Browse files
committed
Update zemra_panel_rce.rb
revised the name and the description
1 parent 501325d commit 3391699

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/multi/http/zemra_panel_rce.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info={})
1414
super(update_info(info,
15-
'Name' => 'Zemra Botnet C2 Web Panel Remote Code Execution',
15+
'Name' => 'Zemra Botnet CnC Web Panel Remote Code Execution',
1616
'Description' => %q{
17-
This module exploits the C2 web panel of Zemra Botnet which contains a backdoor
17+
This module exploits the CnC web panel of Zemra Botnet which contains a backdoor
1818
inside its leaked source code. Zemra is a crimeware bot that can be used to
1919
conduct DDoS attacks and is detected by Symantec as Backdoor.Zemra.
2020
},
@@ -53,7 +53,7 @@ def initialize(info={})
5353

5454
register_options(
5555
[
56-
OptString.new('TARGETURI',[true, "The path of the backdoor inside Zemra Botnet C2 Web Panel", "/Zemra/Panel/Zemra/system/command.php"]),
56+
OptString.new('TARGETURI',[true, "The path of the backdoor inside Zemra Botnet CnC Web Panel", "/Zemra/Panel/Zemra/system/command.php"]),
5757
],self.class)
5858
end
5959

0 commit comments

Comments
 (0)