File tree Expand file tree Collapse file tree 2 files changed +5
-3
lines changed
documentation/modules/exploit/windows/smtp
modules/exploits/windows/smtp Expand file tree Collapse file tree 2 files changed +5
-3
lines changed Original file line number Diff line number Diff line change 2
2
3
3
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
4
4
via its SMTP server validation. The module sends a malicious response along in the
5
- 220 service ready response and exploits the client resulting in an unpriviledged shell.
5
+ 220 service ready response and exploits the client resulting in an unprivileged shell.
6
6
7
7
## Verification Steps
8
8
Original file line number Diff line number Diff line change 1
- ##
1
+
2
2
# This module requires Metasploit: http://metasploit.com/download
3
3
# Current source: https://github.com/rapid7/metasploit-framework
4
4
#
13
13
class MetasploitModule < Msf ::Exploit ::Remote
14
14
include Msf ::Exploit ::Remote ::TcpServer
15
15
16
+ Rank = NormalRanking
17
+
16
18
def initialize ( )
17
19
super (
18
20
'Name' => 'SysGauge SMTP Validation Buffer Overflow' ,
19
21
'Description' => %q{
20
22
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
21
23
via its SMTP server validation. The module sends a malicious response along in the
22
- 220 service ready response and exploits the client resulting in an unpriviledged shell.
24
+ 220 service ready response and exploits the client resulting in an unprivileged shell.
23
25
} ,
24
26
'Author' =>
25
27
[
You can’t perform that action at this time.
0 commit comments