applying description update from zeknox -- thanks!
git-svn-id: file:///home/svn/framework3/trunk@11923 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
79a65cf38a
commit
79da0ead08
|
@ -39,13 +39,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'Microsoft Windows Authenticated User Code Execution',
|
||||
'Description' => %q{
|
||||
This module uses a valid administrator username and password (or
|
||||
password hash) to execute an arbitrary payload. This module is similar
|
||||
to the "psexec" utility provided by SysInternals. Unfortunately, this
|
||||
module is not able to clean up after itself. The service and payload
|
||||
file listed in the output will need to be manually removed after access
|
||||
has been gained. The service created by this tool uses a randomly chosen
|
||||
name and description, so the services list can become cluttered after
|
||||
repeated exploitation.
|
||||
password hash) to execute an arbitrary payload. This module is similar
|
||||
to the "psexec" utility provided by SysInternals. This module is now able
|
||||
to clean up after itself. The service and payload file listed in the output
|
||||
will need to be automatically removed after access has been gained. The service
|
||||
created by this tool uses a randomly chosen name and description.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue