Skip to content

Commit 630e9dd

Browse files
Verification steps update
1 parent 929027a commit 630e9dd

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

documentation/modules/exploit/windows/misc/disk_savvy_adm.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@
33
[DiskSavvy Enterprise](http://www.disksavvy.com/) version v10.4.18, affected by a stack-based buffer overflow vulnerability caused by improper bounds checking of the request sent to the built-in server which can be leveraged by an attacker to execute arbitrary code in the context of NT AUTHORITY\SYSTEM on the target.. This module has been tested successfully on Windows 7 SP1 x86. The vulnerable application is available for download at [DiskSavvy Enterprise](http://www.disksavvy.com/setups/disksavvyent_setup_v10.4.18.exe).
44

55
## Verification Steps
6-
1. Install a vulnerable DiskSavvy Enterprise
7-
6. Start `msfconsole`
8-
3. Do `exploit/windows/misc/disk_savvy_adm`
9-
4. Do `set RHOST ip`
10-
5. Do `set PAYLOAD windows/shell/bind_tcp`
11-
13. Do `exploit`
12-
7. Enjoy you shell
6+
1. Install a vulnerable DiskSavvy Enterprise
7+
2. Start `msfconsole`
8+
3. Do `exploit/windows/misc/disk_savvy_adm`
9+
4. Do `set RHOST ip`
10+
5. Do `set PAYLOAD windows/shell/bind_tcp`
11+
6. Do `exploit`
12+
7. Enjoy you shell
1313

1414
## Scenarios
1515

0 commit comments

Comments
 (0)