Skip to content

Commit 7801ead

Browse files
committed
psh description
1 parent 37312f2 commit 7801ead

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/windows/misc/psh_web_delivery.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ def initialize(info = {})
2222
The main purpose of this module is to quickly establish a session on a target
2323
machine when the attacker has to manually type in the command himself, e.g. RDP
2424
Session, Local Access or maybe Remote Command Exec. This attack vector does not
25-
write to disk so is less likely to trigger AV solutions and will allow to attempt local
26-
privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
27-
matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
25+
write to disk so is less likely to trigger AV solutions and will allow privilege
26+
escalations supplied by Meterpreter. Ensure the payload architecture matches the
27+
target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
2828
},
2929
'License' => MSF_LICENSE,
3030
'Author' =>

0 commit comments

Comments
 (0)