File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed
modules/exploits/windows/smb Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -25,7 +25,7 @@ def initialize(info = {})
25
25
payload using a similar technique to the "psexec" utility provided by SysInternals. The
26
26
payload is encoded in base64 and executed from the commandline using the -encodedcommand
27
27
flag. Using this method, the payload is never written to disk, and given that each payload
28
- is unique, is not prone to signature based detection. Since executing shellcode in .NET
28
+ is unique, is less prone to signature based detection. Since executing shellcode in .NET
29
29
requires the use of system resources from unmanaged memory space, the .NET (PSH) architecture
30
30
must match that of the payload. Lastly, a persist option is provided to execute the payload
31
31
in a while loop in order to maintain a form of persistence. In the event of a sandbox
You can’t perform that action at this time.
0 commit comments