Skip to content

Commit

Permalink
psh description
Browse files Browse the repository at this point in the history
  • Loading branch information
Meatballs1 committed Jul 29, 2013
1 parent 37312f2 commit 7801ead
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions modules/exploits/windows/misc/psh_web_delivery.rb
Original file line number Diff line number Diff line change
Expand Up @@ -22,9 +22,9 @@ def initialize(info = {})
The main purpose of this module is to quickly establish a session on a target
machine when the attacker has to manually type in the command himself, e.g. RDP
Session, Local Access or maybe Remote Command Exec. This attack vector does not
write to disk so is less likely to trigger AV solutions and will allow to attempt local
privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
write to disk so is less likely to trigger AV solutions and will allow privilege
escalations supplied by Meterpreter. Ensure the payload architecture matches the
target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
},
'License' => MSF_LICENSE,
'Author' =>
Expand Down

0 comments on commit 7801ead

Please sign in to comment.