psh description
parent
37312f2aa9
commit
7801eadbc2
|
@ -22,9 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
The main purpose of this module is to quickly establish a session on a target
|
||||
machine when the attacker has to manually type in the command himself, e.g. RDP
|
||||
Session, Local Access or maybe Remote Command Exec. This attack vector does not
|
||||
write to disk so is less likely to trigger AV solutions and will allow to attempt local
|
||||
privilege escalations supplied by Meterpreter. etc. Ensure the payload architecture
|
||||
matches the target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
|
||||
write to disk so is less likely to trigger AV solutions and will allow privilege
|
||||
escalations supplied by Meterpreter. Ensure the payload architecture matches the
|
||||
target computer or use SYSWOW64 powershell.exe to execute x86 payloads on x64 machines.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue