Update zemra_panel_rce.rb

revised the name and the description
bug/bundler_fix
JT 2015-10-02 09:49:59 +08:00
parent 501325d9f4
commit 33916997a4
1 changed files with 3 additions and 3 deletions

View File

@ -12,9 +12,9 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={})
super(update_info(info,
'Name' => 'Zemra Botnet C2 Web Panel Remote Code Execution',
'Name' => 'Zemra Botnet CnC Web Panel Remote Code Execution',
'Description' => %q{
This module exploits the C2 web panel of Zemra Botnet which contains a backdoor
This module exploits the CnC web panel of Zemra Botnet which contains a backdoor
inside its leaked source code. Zemra is a crimeware bot that can be used to
conduct DDoS attacks and is detected by Symantec as Backdoor.Zemra.
},
@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
register_options(
[
OptString.new('TARGETURI',[true, "The path of the backdoor inside Zemra Botnet C2 Web Panel", "/Zemra/Panel/Zemra/system/command.php"]),
OptString.new('TARGETURI',[true, "The path of the backdoor inside Zemra Botnet CnC Web Panel", "/Zemra/Panel/Zemra/system/command.php"]),
],self.class)
end