diff --git a/modules/exploits/android/adb/exec_payload.rb b/modules/exploits/android/adb/adb_server_exec.rb similarity index 96% rename from modules/exploits/android/adb/exec_payload.rb rename to modules/exploits/android/adb/adb_server_exec.rb index 5fa1814a42..4ddbebdacf 100644 --- a/modules/exploits/android/adb/exec_payload.rb +++ b/modules/exploits/android/adb/adb_server_exec.rb @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Android ADB Debug Mode Exec Payload', + 'Name' => 'Android ADB Debug Server Remote Payload Execution', 'Description' => %q{ Writes and spawns a native payload on an android device that is listening for adb debug messages.