Skip to content

Commit b95be1b

Browse files
committed
Support information to include logon scripts
1 parent 0ca0d3d commit b95be1b

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/exploits/windows/smb/group_policy_startup.rb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info={})
1414
super(update_info(info,
15-
'Name' => 'Group Policy Startup Script From Shared Resource',
15+
'Name' => 'Group Policy Script Execution From Shared Resource',
1616
'Description' => %q{
1717
This is a general-purpose module for exploiting systems with Windows Group Policy
18-
configured to load VBS startup scripts from remote locations. This module runs a
19-
SMB shared resource that will provide a payload through an VBS file. The payload
20-
will be executed with SYSTEM privileges on the target loading it through Windows
21-
Group Policy. Have into account which the attacker still needs to the redirect the
18+
configured to load VBS startup/logon scripts from remote locations. This module runs
19+
a SMB shared resource that will provide a payload through a VBS file. Startup scripts
20+
will be executed with SYSTEM privileges, while logon scripts will be executed with the
21+
user privileges. Have into account which the attacker still needs to redirect the
2222
target traffic to the fake SMB share to exploit it successfully.
2323
},
2424
'Author' =>
@@ -35,7 +35,7 @@ def initialize(info={})
3535
{
3636
'EXITFUNC' => 'thread',
3737
},
38-
'Privileged' => true,
38+
'Privileged' => false,
3939
'Platform' => 'win',
4040
'Arch' => [ARCH_X86, ARCH_X86_64],
4141
'Payload' =>

0 commit comments

Comments
 (0)