diff --git a/modules/exploits/windows/local/vss_persistence.rb b/modules/exploits/windows/local/vss_persistence.rb index ba55d056da..074ec1b868 100644 --- a/modules/exploits/windows/local/vss_persistence.rb +++ b/modules/exploits/windows/local/vss_persistence.rb @@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Local been tested successfully on Windows 7. In order to achieve persistence through the RUNKEY option, the user should need password in order to start session on the target machine. }, - 'Author' => ['MrXors '], + 'Author' => ['Jedediah Rodriguez '], # @MrXors 'License' => MSF_LICENSE, 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'],