psh description

bug/bundler_fix
Meatballs 2013-07-29 19:14:12 +01:00
parent 37312f2aa9
commit 7801eadbc2
1 changed files with 3 additions and 3 deletions

View File

@ -22,9 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
The main purpose of this module is to quickly establish a session on a target
machine when the attacker has to manually type in the command himself, e.g. RDP
Session, Local Access or maybe Remote Command Exec. This attack vector does not
write to disk so is less likely to trigger AV solutions and will allow to attempt local
privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
write to disk so is less likely to trigger AV solutions and will allow privilege
escalations supplied by Meterpreter. Ensure the payload architecture matches the
target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
},
'License' => MSF_LICENSE,
'Author' =>