From 37c28ddefb9259dfb07724080527b4e26234080d Mon Sep 17 00:00:00 2001 From: JT Date: Tue, 8 Sep 2015 13:42:12 +0800 Subject: [PATCH] Update simple_backdoors_exec.rb Updated the description --- modules/exploits/multi/http/simple_backdoors_exec.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/exploits/multi/http/simple_backdoors_exec.rb b/modules/exploits/multi/http/simple_backdoors_exec.rb index 270197d473..afdf904043 100644 --- a/modules/exploits/multi/http/simple_backdoors_exec.rb +++ b/modules/exploits/multi/http/simple_backdoors_exec.rb @@ -15,9 +15,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Simple Backdoor Shell Remote Code Execution', 'Description' => %q{ This module exploits unauthenticated simple web backdoor shells by leveraging the - common backdoor shell's CMD parameter to execute commands. The SecLists project of - Daniel Miessler and Jason Haddix has a lot of samples for this kind of backdoor shells - which is categorized under Payloads. + common backdoor shells' CMD parameter to execute commands. The SecLists project of + Daniel Miessler and Jason Haddix has a lot of samples for these kind of backdoor shells + which are categorized under Payloads. }, 'License' => MSF_LICENSE, 'Author' =>