bump ranking up, comment about crash recovery
git-svn-id: file:///home/svn/framework3/trunk@8154 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
477468147b
commit
db5097af91
|
@ -12,7 +12,7 @@
|
|||
require 'msf/core'
|
||||
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
Rank = AverageRanking
|
||||
Rank = GoodRanking
|
||||
|
||||
include Msf::Exploit::Remote::MSSQL
|
||||
|
||||
|
@ -46,6 +46,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
finally execute the payload via a "jmp esp". All addresses used were found
|
||||
within the sqlservr.exe memory space, yielding very reliable code execution
|
||||
using only a single query.
|
||||
|
||||
NOTE: The MSSQL server service does not automatically restart by default. That
|
||||
said, some exceptions are caught and will not result in terminating the process.
|
||||
If the exploit crashes the service prior to hijacking the stack, it won't die.
|
||||
Otherwise, it's a goner.
|
||||
},
|
||||
'Author' => [ 'jduck' ],
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
Loading…
Reference in New Issue