Add minor cleanup for vss_persistence

bug/bundler_fix
jvazquez-r7 2013-10-15 09:56:18 -05:00
parent 6a1b1f35a8
commit 18b4f80ca9
1 changed files with 4 additions and 8 deletions

View File

@ -7,14 +7,10 @@
require 'msf/core' require 'msf/core'
require 'rex' require 'rex'
require 'msf/core/post/windows/shadowcopy'
require 'msf/core/post/windows/priv'
require 'msf/core/post/common'
class Metasploit4 < Msf::Post class Metasploit4 < Msf::Post
include Msf::Post::File include Msf::Post::File
include Msf::Post::Common
include Msf::Post::Windows::Priv include Msf::Post::Windows::Priv
include Msf::Post::Windows::ShadowCopy include Msf::Post::Windows::ShadowCopy
include Msf::Post::Windows::Services include Msf::Post::Windows::Services
@ -25,10 +21,10 @@ class Metasploit4 < Msf::Post
super(update_info(info, super(update_info(info,
'Name' => "Persistant Payload in Windows Volume Shadow Copy", 'Name' => "Persistant Payload in Windows Volume Shadow Copy",
'Description' => %q{ 'Description' => %q{
This module will attempt to create a persistant payload This module will attempt to create a persistant payload in new volume shadow copy. This is
in new volume shadow copy.This is based on the VSSOwn based on the VSSOwn Script originally posted by Tim Tomes and Mark Baggett. This module has
Script originally posted by Tim Tomes and Mark Baggett. been tested successfully on Windows 7. In order to achieve persistence through the RUNKEY
This module has been tested successfully on Windows 7. option, the user should need password in order to start session on the target machine.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Platform' => ['win'], 'Platform' => ['win'],