File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/exploits/windows/misc Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -22,9 +22,9 @@ def initialize(info = {})
22
22
The main purpose of this module is to quickly establish a session on a target
23
23
machine when the attacker has to manually type in the command himself, e.g. RDP
24
24
Session, Local Access or maybe Remote Command Exec. This attack vector does not
25
- write to disk so is less likely to trigger AV solutions and will allow to attempt local
26
- privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
27
- matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
25
+ write to disk so is less likely to trigger AV solutions and will allow privilege
26
+ escalations supplied by Meterpreter. Ensure the payload architecture matches the
27
+ target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
28
28
} ,
29
29
'License' => MSF_LICENSE ,
30
30
'Author' =>
You can’t perform that action at this time.
0 commit comments