diff --git a/modules/exploits/windows/smb/psexec.rb b/modules/exploits/windows/smb/psexec.rb index 8ccf4cc384..01c69a0c32 100644 --- a/modules/exploits/windows/smb/psexec.rb +++ b/modules/exploits/windows/smb/psexec.rb @@ -39,13 +39,11 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Microsoft Windows Authenticated User Code Execution', 'Description' => %q{ This module uses a valid administrator username and password (or - password hash) to execute an arbitrary payload. This module is similar - to the "psexec" utility provided by SysInternals. Unfortunately, this - module is not able to clean up after itself. The service and payload - file listed in the output will need to be manually removed after access - has been gained. The service created by this tool uses a randomly chosen - name and description, so the services list can become cluttered after - repeated exploitation. + password hash) to execute an arbitrary payload. This module is similar + to the "psexec" utility provided by SysInternals. This module is now able + to clean up after itself. The service and payload file listed in the output + will need to be automatically removed after access has been gained. The service + created by this tool uses a randomly chosen name and description. }, 'Author' => [