Skip to content

Commit 7a12e44

Browse files
committed
Updated documentation and fixed module header. Whoops, copy/paste fail.
1 parent f4bb1d6 commit 7a12e44

File tree

2 files changed

+4
-6
lines changed

2 files changed

+4
-6
lines changed

documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
## Vulnerable Application
22

3-
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
3+
This module will setup an SMTP server expecting a connection from SysGauge 1.5.18
44
via its SMTP server validation. The module sends a malicious response along in the
5-
220 service ready response and exploits the client resulting in an unprivileged shell.
5+
220 service ready response and exploits the client, resulting in an unprivileged shell.
6+
7+
he software is available for download from [SysGauge](http://www.sysgauge.com/setups/sysgauge_setup_v1.5.18.exe).
68

79
## Verification Steps
810

modules/exploits/windows/smtp/sysgauge_client_bof.rb

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,6 @@
22
# This module requires Metasploit: http://metasploit.com/download
33
# Current source: https://github.com/rapid7/metasploit-framework
44
#
5-
# Fuzzer written by corelanc0d3r - <peter.ve [at] corelan.be>
6-
# http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/
7-
#
8-
##
95

106
class MetasploitModule < Msf::Exploit::Remote
117
include Msf::Exploit::Remote::TcpServer

0 commit comments

Comments
 (0)