@@ -16,17 +16,16 @@ def initialize(info = {})
16
16
super ( update_info ( info ,
17
17
'Name' => 'Powershell Payload Web Delivery' ,
18
18
'Description' => %q{
19
- Quickly fires up a web server that serves the payload in powershell.
20
- The command will start powershell and then download and execute the payload.
21
- You can extract the IEX command to execute directly from powershell.
22
- The main purpose of this module is to quickly establish a session
23
- on a target machine when you have to manually type in the command yourself,
24
- e.g. RDP Session, Local Access or maybe Remote Command Exec.
25
- This does not write to disk so is unlikely to trigger AV solutions and will
26
- allow you to attempt local privilege escalations supplied by meterpreter etc.
27
- You could also try your luck with social engineering.
28
- Ensure your payload architecture matches the target computer or use SYSWOW64
29
- powershell.exe to execute x86 payloads on x64 machines.
19
+ This module quickly fires up a web server that serves the payload in powershell.
20
+ The provided command will start powershell and then download and execute the
21
+ payload. The IEX command can also be extracted to execute directly from powershell.
22
+ The main purpose of this module is to quickly establish a session on a target
23
+ machine when the attacker has to manually type in the command himself, e.g. RDP
24
+ Session, Local Access or maybe Remote Command Exec. This attack vector does not
25
+ write to disk so is unlikely to trigger AV solutions and will allow to attempt local
26
+ privilege escalations supplied by meterpreter etc. You could also try your luck with
27
+ social engineering. Ensure the payload architecture matches the target computer or
28
+ use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
30
29
} ,
31
30
'License' => MSF_LICENSE ,
32
31
'Author' =>
0 commit comments