Skip to content

Commit f81369a

Browse files
committed
Don't make promises about AV detection
1 parent 91b748a commit f81369a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/smb/psexec_psh.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ def initialize(info = {})
2525
payload using a similar technique to the "psexec" utility provided by SysInternals. The
2626
payload is encoded in base64 and executed from the commandline using the -encodedcommand
2727
flag. Using this method, the payload is never written to disk, and given that each payload
28-
is unique, is not prone to signature based detection. Since executing shellcode in .NET
28+
is unique, is less prone to signature based detection. Since executing shellcode in .NET
2929
requires the use of system resources from unmanaged memory space, the .NET (PSH) architecture
3030
must match that of the payload. Lastly, a persist option is provided to execute the payload
3131
in a while loop in order to maintain a form of persistence. In the event of a sandbox

0 commit comments

Comments
 (0)