File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed
modules/exploits/windows/misc Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -14,11 +14,11 @@ class Metasploit3 < Msf::Exploit::Remote
14
14
15
15
def initialize ( info = { } )
16
16
super ( update_info ( info ,
17
- 'Name' => 'Powershell Payload Web Delivery' ,
17
+ 'Name' => 'PowerShell Payload Web Delivery' ,
18
18
'Description' => %q{
19
- This module quickly fires up a web server that serves the payload in powershell .
20
- The provided command will start powershell and then download and execute the
21
- payload. The IEX command can also be extracted to execute directly from powershell .
19
+ This module quickly fires up a web server that serves the payload in PowerShell .
20
+ The provided command will start PowerShell and then download and execute the
21
+ payload. The IEX command can also be extracted to execute directly from PowerShell .
22
22
The main purpose of this module is to quickly establish a session on a target
23
23
machine when the attacker has to manually type in the command himself, e.g. RDP
24
24
Session, Local Access or maybe Remote Command Exec. This attack vector does not
You can’t perform that action at this time.
0 commit comments