From c68319d09880e19130e9e9141cfe8a2b7b53ac90 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 15 Oct 2013 12:59:19 -0500 Subject: [PATCH] Fix author --- modules/exploits/windows/local/vss_persistence.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/local/vss_persistence.rb b/modules/exploits/windows/local/vss_persistence.rb index ba55d056da..074ec1b868 100644 --- a/modules/exploits/windows/local/vss_persistence.rb +++ b/modules/exploits/windows/local/vss_persistence.rb @@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Local been tested successfully on Windows 7. In order to achieve persistence through the RUNKEY option, the user should need password in order to start session on the target machine. }, - 'Author' => ['MrXors '], + 'Author' => ['Jedediah Rodriguez '], # @MrXors 'License' => MSF_LICENSE, 'Platform' => ['win'], 'SessionTypes' => ['meterpreter'],