From 33916997a466091a1260133804082fa4d889dddb Mon Sep 17 00:00:00 2001 From: JT Date: Fri, 2 Oct 2015 09:49:59 +0800 Subject: [PATCH] Update zemra_panel_rce.rb revised the name and the description --- modules/exploits/multi/http/zemra_panel_rce.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/exploits/multi/http/zemra_panel_rce.rb b/modules/exploits/multi/http/zemra_panel_rce.rb index d00be6cd6b..57fdaadb76 100644 --- a/modules/exploits/multi/http/zemra_panel_rce.rb +++ b/modules/exploits/multi/http/zemra_panel_rce.rb @@ -12,9 +12,9 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info={}) super(update_info(info, - 'Name' => 'Zemra Botnet C2 Web Panel Remote Code Execution', + 'Name' => 'Zemra Botnet CnC Web Panel Remote Code Execution', 'Description' => %q{ - This module exploits the C2 web panel of Zemra Botnet which contains a backdoor + This module exploits the CnC web panel of Zemra Botnet which contains a backdoor inside its leaked source code. Zemra is a crimeware bot that can be used to conduct DDoS attacks and is detected by Symantec as Backdoor.Zemra. }, @@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote register_options( [ - OptString.new('TARGETURI',[true, "The path of the backdoor inside Zemra Botnet C2 Web Panel", "/Zemra/Panel/Zemra/system/command.php"]), + OptString.new('TARGETURI',[true, "The path of the backdoor inside Zemra Botnet CnC Web Panel", "/Zemra/Panel/Zemra/system/command.php"]), ],self.class) end