File tree Expand file tree Collapse file tree 2 files changed +4
-6
lines changed
documentation/modules/exploit/windows/smtp
modules/exploits/windows/smtp Expand file tree Collapse file tree 2 files changed +4
-6
lines changed Original file line number Diff line number Diff line change 1
1
## Vulnerable Application
2
2
3
- This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
3
+ This module will setup an SMTP server expecting a connection from SysGauge 1.5.18
4
4
via its SMTP server validation. The module sends a malicious response along in the
5
- 220 service ready response and exploits the client resulting in an unprivileged shell.
5
+ 220 service ready response and exploits the client, resulting in an unprivileged shell.
6
+
7
+ he software is available for download from [ SysGauge] ( http://www.sysgauge.com/setups/sysgauge_setup_v1.5.18.exe ) .
6
8
7
9
## Verification Steps
8
10
Original file line number Diff line number Diff line change 2
2
# This module requires Metasploit: http://metasploit.com/download
3
3
# Current source: https://github.com/rapid7/metasploit-framework
4
4
#
5
- # Fuzzer written by corelanc0d3r - <peter.ve [at] corelan.be>
6
- # http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/
7
- #
8
- ##
9
5
10
6
class MetasploitModule < Msf ::Exploit ::Remote
11
7
include Msf ::Exploit ::Remote ::TcpServer
You can’t perform that action at this time.
0 commit comments