Support information to include logon scripts

bug/bundler_fix
jvazquez-r7 2015-05-04 15:49:19 -05:00
parent 0ca0d3d045
commit b95be1b25f
No known key found for this signature in database
GPG Key ID: 38D99152B9352D83
1 changed files with 6 additions and 6 deletions

View File

@ -12,13 +12,13 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={})
super(update_info(info,
'Name' => 'Group Policy Startup Script From Shared Resource',
'Name' => 'Group Policy Script Execution From Shared Resource',
'Description' => %q{
This is a general-purpose module for exploiting systems with Windows Group Policy
configured to load VBS startup scripts from remote locations. This module runs a
SMB shared resource that will provide a payload through an VBS file. The payload
will be executed with SYSTEM privileges on the target loading it through Windows
Group Policy. Have into account which the attacker still needs to the redirect the
configured to load VBS startup/logon scripts from remote locations. This module runs
a SMB shared resource that will provide a payload through a VBS file. Startup scripts
will be executed with SYSTEM privileges, while logon scripts will be executed with the
user privileges. Have into account which the attacker still needs to redirect the
target traffic to the fake SMB share to exploit it successfully.
},
'Author' =>
@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
{
'EXITFUNC' => 'thread',
},
'Privileged' => true,
'Privileged' => false,
'Platform' => 'win',
'Arch' => [ARCH_X86, ARCH_X86_64],
'Payload' =>