diff --git a/modules/exploits/windows/misc/psh_web_delivery.rb b/modules/exploits/windows/misc/psh_web_delivery.rb index 51144ec9a4..96036180a1 100644 --- a/modules/exploits/windows/misc/psh_web_delivery.rb +++ b/modules/exploits/windows/misc/psh_web_delivery.rb @@ -22,9 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote The main purpose of this module is to quickly establish a session on a target machine when the attacker has to manually type in the command himself, e.g. RDP Session, Local Access or maybe Remote Command Exec. This attack vector does not - write to disk so is less likely to trigger AV solutions and will allow to attempt local - privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture - matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines. + write to disk so is less likely to trigger AV solutions and will allow privilege + escalations supplied by Meterpreter. Ensure the payload architecture matches the + target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines. }, 'License' => MSF_LICENSE, 'Author' =>