From 7801eadbc2f3630d8db4384c6bd8cffb9308f34e Mon Sep 17 00:00:00 2001 From: Meatballs Date: Mon, 29 Jul 2013 19:14:12 +0100 Subject: [PATCH] psh description --- modules/exploits/windows/misc/psh_web_delivery.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/misc/psh_web_delivery.rb b/modules/exploits/windows/misc/psh_web_delivery.rb index 51144ec9a481..96036180a1c3 100644 --- a/modules/exploits/windows/misc/psh_web_delivery.rb +++ b/modules/exploits/windows/misc/psh_web_delivery.rb @@ -22,9 +22,9 @@ def initialize(info = {}) The main purpose of this module is to quickly establish a session on a target machine when the attacker has to manually type in the command himself, e.g. RDP Session, Local Access or maybe Remote Command Exec. This attack vector does not - write to disk so is less likely to trigger AV solutions and will allow to attempt local - privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture - matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines. + write to disk so is less likely to trigger AV solutions and will allow privilege + escalations supplied by Meterpreter. Ensure the payload architecture matches the + target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines. }, 'License' => MSF_LICENSE, 'Author' =>