Skip to content

Commit e715eab

Browse files
committed
Update description
1 parent e155f29 commit e715eab

File tree

2 files changed

+3
-5
lines changed

2 files changed

+3
-5
lines changed

modules/exploits/windows/http/generic_http_dll_injection.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info={})
1717
'Name' => 'Generic Web Application DLL Injection',
1818
'Description' => %q{
1919
This is a general-purpose module for exploiting conditions where a HTTP request
20-
triggers a DLL load from a specified SMB share. This module serves payloads as
20+
triggers a DLL load from an specified SMB share. This module serves payloads as
2121
DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would
2222
trigger the load of the DLL.
2323
},

modules/exploits/windows/smb/generic_smb_dll_injection.rb

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,8 @@ def initialize(info={})
1515
super(update_info(info,
1616
'Name' => 'Generic DLL Injection From Shared Resource',
1717
'Description' => %q{
18-
This is an example implementation of using the SMBFileServer module
19-
to serve an arbitrary DLL over SMB.
20-
This module will sit around waiting for a DLL to be loaded,
21-
for instance by the "payload/windows/loadlibrary" module.
18+
This is a general-purpose module for exploiting conditions where a DLL can be loaded
19+
from an specified SMB share. This module serves payloads as DLLs over an SMB service.
2220
},
2321
'Author' =>
2422
[

0 commit comments

Comments
 (0)