From 6d88c264741fcca1bcb5618ce68a066c73b6b0ea Mon Sep 17 00:00:00 2001 From: OJ Date: Thu, 18 Feb 2016 14:23:43 +1000 Subject: [PATCH] Change title, and remove requires --- modules/exploits/windows/local/applocker_bypass.rb | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/modules/exploits/windows/local/applocker_bypass.rb b/modules/exploits/windows/local/applocker_bypass.rb index 9fc9f8bebc..ab95094ff1 100644 --- a/modules/exploits/windows/local/applocker_bypass.rb +++ b/modules/exploits/windows/local/applocker_bypass.rb @@ -3,10 +3,6 @@ # Current source: https://github.com/rapid7/metasploit-framework ## -require 'msf/core' -require 'rex' -require 'msf/core/exploit/exe' - class Metasploit4 < Msf::Exploit::Local Rank = ExcellentRanking @@ -15,7 +11,7 @@ class Metasploit4 < Msf::Exploit::Local def initialize(info={}) super(update_info(info, - 'Name' => 'AppLocker bypass', + 'Name' => 'AppLocker Execution Prevention Bypass', 'Description' => %q{ This module will generate a .NET service executable on the target and utilise InstallUtil to run the payload bypassing the AppLocker protection.