diff --git a/lib/msf/core/exploit/psexec.rb b/lib/msf/core/exploit/psexec.rb index 8d986e890a..209f917a5f 100644 --- a/lib/msf/core/exploit/psexec.rb +++ b/lib/msf/core/exploit/psexec.rb @@ -8,17 +8,18 @@ module Msf ### # -# This module alows for resuse of the psexec code execution module +# This module alows for reuse of the psexec code execution module # ### -module Exploit::Remote::PSEXEC +module Exploit::Remote::Psexec include Msf::Exploit::Remote::DCERPC include Msf::Exploit::Remote::SMB - # This code was stolen straight out of psexec.rb. Thanks very much for all who contributed to that module!! - # Instead of uploading and runing a binary. This method runs a single windows command fed into the #{command} paramater + # This code was stolen straight out of psexec.rb. Thanks very much for all + # who contributed to that module!! Instead of uploading and runing a binary. + # This method runs a single windows command fed into the #{command} paramater def psexec(command) simple.connect("IPC$")