applying description update from zeknox -- thanks!

git-svn-id: file:///home/svn/framework3/trunk@11923 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Jonathan Cran 2011-03-10 05:36:17 +00:00
parent 79a65cf38a
commit 79da0ead08
1 changed files with 5 additions and 7 deletions

View File

@ -39,13 +39,11 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Microsoft Windows Authenticated User Code Execution',
'Description' => %q{
This module uses a valid administrator username and password (or
password hash) to execute an arbitrary payload. This module is similar
to the "psexec" utility provided by SysInternals. Unfortunately, this
module is not able to clean up after itself. The service and payload
file listed in the output will need to be manually removed after access
has been gained. The service created by this tool uses a randomly chosen
name and description, so the services list can become cluttered after
repeated exploitation.
password hash) to execute an arbitrary payload. This module is similar
to the "psexec" utility provided by SysInternals. This module is now able
to clean up after itself. The service and payload file listed in the output
will need to be automatically removed after access has been gained. The service
created by this tool uses a randomly chosen name and description.
},
'Author' =>
[