Skip to content

Commit a885ff9

Browse files
author
Tod Beardsley
committed
Use consistent caps for 'PowerShell'
1 parent 5ea6758 commit a885ff9

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/windows/misc/psh_web_delivery.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'Powershell Payload Web Delivery',
17+
'Name' => 'PowerShell Payload Web Delivery',
1818
'Description' => %q{
19-
This module quickly fires up a web server that serves the payload in powershell.
20-
The provided command will start powershell and then download and execute the
21-
payload. The IEX command can also be extracted to execute directly from powershell.
19+
This module quickly fires up a web server that serves the payload in PowerShell.
20+
The provided command will start PowerShell and then download and execute the
21+
payload. The IEX command can also be extracted to execute directly from PowerShell.
2222
The main purpose of this module is to quickly establish a session on a target
2323
machine when the attacker has to manually type in the command himself, e.g. RDP
2424
Session, Local Access or maybe Remote Command Exec. This attack vector does not

0 commit comments

Comments
 (0)