Minor cleanup
parent
86f6d59d2e
commit
dd7ab11e38
|
@ -178,7 +178,7 @@ module Exploit::Remote::WinRM
|
|||
rxml = REXML::Document.new(xml).root
|
||||
rxml.elements.to_a("//rsp:Stream").each do |node|
|
||||
next if node.text.nil?
|
||||
streams[node.attributes['Name']] << Rex::Text.base64_decode(node.text)
|
||||
streams[node.attributes['Name']] << Rex::Text.decode_base64(node.text)
|
||||
end
|
||||
return streams
|
||||
end
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
works only if the remote end allows Negotiate(NTLM) authentication.
|
||||
Kerberos is not currently supported. Please note: in order to use this
|
||||
module without SSL, the 'AllowUnencrypted' winrm option must be set.
|
||||
Otherwise adjsut the port and set the SSL options in the module as appropriate.
|
||||
Otherwise adjust the port and set the SSL options in the module as appropriate.
|
||||
},
|
||||
'Author' => [ 'thelightcosine' ],
|
||||
'References' =>
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'WinRM Powershell Remote Code Execution',
|
||||
'Description' => %q{
|
||||
This module uses valid redentials to login to the WinRM service
|
||||
This module uses valid credentials to login to the WinRM service
|
||||
and execute a payload as a powershell script. It then attempts to
|
||||
automigrate before the WinRS shell dies.
|
||||
|
||||
|
|
Loading…
Reference in New Issue