Skip to content

Commit a65604b

Browse files
authored
Add introduction header to web_delivery
1 parent 2d8a249 commit a65604b

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

documentation/modules/exploit/multi/script/web_delivery.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,13 @@
1+
## Introduction
2+
13
The web_delivery module provides a stealthy way to deliver a payload during post exploitation over HTTP or HTTPS. Because the payload does not touch the disk, it can easily bypass many anti-virus protections.
24

35
The web_delivery module supports three different languages for delivery: Python, PHP, and
46
Powershell. You should manually select the correct target based on the victim environment you are exploiting.
57

68
For example, if you have gained remote access through a PHP application, it is likely you can use PHP. If you are in a modern Windows server environment, then you can usually assume the target supports Powershell as well.
79

10+
811
## Verification Steps
912

1013
To use the web_delivery module, you must first gain access to the target host and be able to execute either a Python, PHP, or Powershell interpreter. Then, follow these steps to proceed with exploitation:

0 commit comments

Comments
 (0)