Skip to content

Commit 5529bc1

Browse files
author
zerosum0x0
committed
fix docs
1 parent 9b7c19d commit 5529bc1

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

documentation/modules/auxiliary/admin/smb/ms17_010_psexec.md renamed to documentation/modules/auxiliary/admin/smb/ms17_010_command.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ This module is highly reliable and preferred over EternalBlue where a Named Pipe
99

1010
## Vulnerable Server
1111

12-
To be able to use auxiliary/admin/smb/ms17_010_psexec:
12+
To be able to use auxiliary/admin/smb/ms17_010_command:
1313

1414
1. You can OPTIONALLY use a valid username/password to bypass most of these requirements.
1515
2. The firewall must allow SMB traffic.
@@ -24,15 +24,15 @@ You can check all of these with the SMB MS17-010 and Pipe Auditor auxiliary scan
2424
At the minimum, you should be able use psexec to get a session with a valid credential using the following:
2525

2626
```
27-
msf > use auxiliary/admin/smb/ms17_010_psexec
27+
msf > use auxiliary/admin/smb/ms17_010_command
2828
msf exploit(psexec) > set RHOST 192.168.1.80
2929
RHOST => 192.168.1.80
3030
msf exploit(psexec) > exploit
3131
```
3232

3333
## Options
3434

35-
By default, using auxiliary/admin/smb/ms17_010_psexec can be as simple as setting the RHOST option, and you're ready to go.
35+
By default, using auxiliary/admin/smb/ms17_010_command can be as simple as setting the RHOST option, and you're ready to go.
3636

3737
**The NAMEDPIPE Option**
3838

0 commit comments

Comments
 (0)