File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed
modules/exploits/windows/smb Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -12,13 +12,13 @@ class Metasploit3 < Msf::Exploit::Remote
12
12
13
13
def initialize ( info = { } )
14
14
super ( update_info ( info ,
15
- 'Name' => 'Group Policy Startup Script From Shared Resource' ,
15
+ 'Name' => 'Group Policy Script Execution From Shared Resource' ,
16
16
'Description' => %q{
17
17
This is a general-purpose module for exploiting systems with Windows Group Policy
18
- configured to load VBS startup scripts from remote locations. This module runs a
19
- SMB shared resource that will provide a payload through an VBS file. The payload
20
- will be executed with SYSTEM privileges on the target loading it through Windows
21
- Group Policy . Have into account which the attacker still needs to the redirect the
18
+ configured to load VBS startup/logon scripts from remote locations. This module runs
19
+ a SMB shared resource that will provide a payload through a VBS file. Startup scripts
20
+ will be executed with SYSTEM privileges, while logon scripts will be executed with the
21
+ user privileges . Have into account which the attacker still needs to redirect the
22
22
target traffic to the fake SMB share to exploit it successfully.
23
23
} ,
24
24
'Author' =>
@@ -35,7 +35,7 @@ def initialize(info={})
35
35
{
36
36
'EXITFUNC' => 'thread' ,
37
37
} ,
38
- 'Privileged' => true ,
38
+ 'Privileged' => false ,
39
39
'Platform' => 'win' ,
40
40
'Arch' => [ ARCH_X86 , ARCH_X86_64 ] ,
41
41
'Payload' =>
You can’t perform that action at this time.
0 commit comments