Add introduction header to web_delivery
parent
2d8a249a56
commit
a65604b09d
|
@ -1,3 +1,5 @@
|
|||
## Introduction
|
||||
|
||||
The web_delivery module provides a stealthy way to deliver a payload during post exploitation over HTTP or HTTPS. Because the payload does not touch the disk, it can easily bypass many anti-virus protections.
|
||||
|
||||
The web_delivery module supports three different languages for delivery: Python, PHP, and
|
||||
|
@ -5,6 +7,7 @@ Powershell. You should manually select the correct target based on the victim en
|
|||
|
||||
For example, if you have gained remote access through a PHP application, it is likely you can use PHP. If you are in a modern Windows server environment, then you can usually assume the target supports Powershell as well.
|
||||
|
||||
|
||||
## Verification Steps
|
||||
|
||||
To use the web_delivery module, you must first gain access to the target host and be able to execute either a Python, PHP, or Powershell interpreter. Then, follow these steps to proceed with exploitation:
|
||||
|
|
Loading…
Reference in New Issue