Skip to content

Commit 728cfaf

Browse files
author
Matthew Hall
committed
cleanups
1 parent e4bab60 commit 728cfaf

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

modules/exploits/windows/http/generic_http_dllinject.rb

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
##
55

66
# This is an example implementation of using the Msf::Exploit::Remote::SMBFileServer module
7-
# to perform an arbitrary DLL injection over SMB
7+
# to serve an arbitrary DLL over HTTP
88

99
require 'msf/core'
1010

@@ -15,11 +15,12 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info={})
1717
super(update_info(info,
18-
'Name' => 'DLL Injection over HTTP',
18+
'Name' => 'HTTP DLL Server',
1919
'Description' => %q{
20-
This is an example implementation of using the SMBFileServer module
21-
to perform DLL injection over SMB via an webserver which
22-
will arbitrarily load a DLL given as an argument (Yes, these exist IRL).
20+
This is a general-purpose module for exploiting conditions where a HTTP request
21+
triggers a DLL load from a specified SMB share. This module serves payloads as
22+
DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would
23+
trigger the load of the DLL.
2324
},
2425
'Author' => [
2526
'Matthew Hall <[email protected]>',

0 commit comments

Comments
 (0)