diff --git a/modules/exploits/windows/local/current_user_psexec.rb b/modules/exploits/windows/local/current_user_psexec.rb index 3198dcd497..7e1a85b5d1 100644 --- a/modules/exploits/windows/local/current_user_psexec.rb +++ b/modules/exploits/windows/local/current_user_psexec.rb @@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Local # same as for windows/smb/psexec [ 'CVE', '1999-0504'], # Administrator with no password (since this is the default) [ 'OSVDB', '3106'], - [ 'URL', 'http://www.microsoft.com/technet/sysinternals/utilities/psexec.mspx' ] + [ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ] ], 'DisclosureDate' => 'Jan 01 1999', 'Version' => '$Revision$', diff --git a/modules/exploits/windows/smb/psexec.rb b/modules/exploits/windows/smb/psexec.rb index 4b2f80b9f2..8fc3abd59a 100644 --- a/modules/exploits/windows/smb/psexec.rb +++ b/modules/exploits/windows/smb/psexec.rb @@ -61,7 +61,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'CVE', '1999-0504'], # Administrator with no password (since this is the default) [ 'OSVDB', '3106'], - [ 'URL', 'http://www.microsoft.com/technet/sysinternals/utilities/psexec.mspx' ] + [ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ] ], 'Payload' => { diff --git a/modules/exploits/windows/smb/smb_relay.rb b/modules/exploits/windows/smb/smb_relay.rb index 5f30a1aea1..b0b94261d8 100644 --- a/modules/exploits/windows/smb/smb_relay.rb +++ b/modules/exploits/windows/smb/smb_relay.rb @@ -86,7 +86,7 @@ class Metasploit3 < Msf::Exploit::Remote [ 'MSB', 'MS08-068'], [ 'URL', 'http://blogs.technet.com/swi/archive/2008/11/11/smb-credential-reflection.aspx'], [ 'URL', 'http://en.wikipedia.org/wiki/SMBRelay' ], - [ 'URL', 'http://www.microsoft.com/technet/sysinternals/utilities/psexec.mspx' ], + [ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ], [ 'URL', 'http://www.xfocus.net/articles/200305/smbrelay.html' ] ], 'Platform' => 'win',