diff --git a/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md b/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md index d299225fe2..d422147189 100644 --- a/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md +++ b/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md @@ -1,8 +1,10 @@ ## Vulnerable Application - This module will setup a SMTP server expecting a connection from SysGauge 1.5.18 + This module will setup an SMTP server expecting a connection from SysGauge 1.5.18 via its SMTP server validation. The module sends a malicious response along in the -220 service ready response and exploits the client resulting in an unprivileged shell. +220 service ready response and exploits the client, resulting in an unprivileged shell. + + he software is available for download from [SysGauge](http://www.sysgauge.com/setups/sysgauge_setup_v1.5.18.exe). ## Verification Steps diff --git a/modules/exploits/windows/smtp/sysgauge_client_bof.rb b/modules/exploits/windows/smtp/sysgauge_client_bof.rb index 47e3adc05e..b72b2832cf 100644 --- a/modules/exploits/windows/smtp/sysgauge_client_bof.rb +++ b/modules/exploits/windows/smtp/sysgauge_client_bof.rb @@ -2,10 +2,6 @@ # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework # -# Fuzzer written by corelanc0d3r - -# http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/ -# -## class MetasploitModule < Msf::Exploit::Remote include Msf::Exploit::Remote::TcpServer