Skip to content

Commit 9304bbe

Browse files
author
Tod Beardsley
committed
Land #3 from @Meatballs1, more better description
2 parents 37312f2 + 7801ead commit 9304bbe

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/windows/misc/psh_web_delivery.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ def initialize(info = {})
2222
The main purpose of this module is to quickly establish a session on a target
2323
machine when the attacker has to manually type in the command himself, e.g. RDP
2424
Session, Local Access or maybe Remote Command Exec. This attack vector does not
25-
write to disk so is less likely to trigger AV solutions and will allow to attempt local
26-
privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
27-
matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
25+
write to disk so is less likely to trigger AV solutions and will allow privilege
26+
escalations supplied by Meterpreter. Ensure the payload architecture matches the
27+
target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
2828
},
2929
'License' => MSF_LICENSE,
3030
'Author' =>

0 commit comments

Comments
 (0)