Support information to include logon scripts
parent
0ca0d3d045
commit
b95be1b25f
|
@ -12,13 +12,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Group Policy Startup Script From Shared Resource',
|
'Name' => 'Group Policy Script Execution From Shared Resource',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This is a general-purpose module for exploiting systems with Windows Group Policy
|
This is a general-purpose module for exploiting systems with Windows Group Policy
|
||||||
configured to load VBS startup scripts from remote locations. This module runs a
|
configured to load VBS startup/logon scripts from remote locations. This module runs
|
||||||
SMB shared resource that will provide a payload through an VBS file. The payload
|
a SMB shared resource that will provide a payload through a VBS file. Startup scripts
|
||||||
will be executed with SYSTEM privileges on the target loading it through Windows
|
will be executed with SYSTEM privileges, while logon scripts will be executed with the
|
||||||
Group Policy. Have into account which the attacker still needs to the redirect the
|
user privileges. Have into account which the attacker still needs to redirect the
|
||||||
target traffic to the fake SMB share to exploit it successfully.
|
target traffic to the fake SMB share to exploit it successfully.
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
{
|
{
|
||||||
'EXITFUNC' => 'thread',
|
'EXITFUNC' => 'thread',
|
||||||
},
|
},
|
||||||
'Privileged' => true,
|
'Privileged' => false,
|
||||||
'Platform' => 'win',
|
'Platform' => 'win',
|
||||||
'Arch' => [ARCH_X86, ARCH_X86_64],
|
'Arch' => [ARCH_X86, ARCH_X86_64],
|
||||||
'Payload' =>
|
'Payload' =>
|
||||||
|
|
Loading…
Reference in New Issue