Skip to content

Commit dbad1a5

Browse files
author
jvazquez-r7
committed
Clean up description
1 parent 18dbdb8 commit dbad1a5

File tree

1 file changed

+10
-11
lines changed

1 file changed

+10
-11
lines changed

modules/exploits/windows/misc/psh_web_delivery.rb

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,17 +16,16 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'Powershell Payload Web Delivery',
1818
'Description' => %q{
19-
Quickly fires up a web server that serves the payload in powershell.
20-
The command will start powershell and then download and execute the payload.
21-
You can extract the IEX command to execute directly from powershell.
22-
The main purpose of this module is to quickly establish a session
23-
on a target machine when you have to manually type in the command yourself,
24-
e.g. RDP Session, Local Access or maybe Remote Command Exec.
25-
This does not write to disk so is unlikely to trigger AV solutions and will
26-
allow you to attempt local privilege escalations supplied by meterpreter etc.
27-
You could also try your luck with social engineering.
28-
Ensure your payload architecture matches the target computer or use SYSWOW64
29-
powershell.exe to execute x86 payloads on x64 machines.
19+
This module quickly fires up a web server that serves the payload in powershell.
20+
The provided command will start powershell and then download and execute the
21+
payload. The IEX command can also be extracted to execute directly from powershell.
22+
The main purpose of this module is to quickly establish a session on a target
23+
machine when the attacker has to manually type in the command himself, e.g. RDP
24+
Session, Local Access or maybe Remote Command Exec. This attack vector does not
25+
write to disk so is unlikely to trigger AV solutions and will allow to attempt local
26+
privilege escalations supplied by meterpreter etc. You could also try your luck with
27+
social engineering. Ensure the payload architecture matches the target computer or
28+
use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
3029
},
3130
'License' => MSF_LICENSE,
3231
'Author' =>

0 commit comments

Comments
 (0)