Update description
parent
e155f2998e
commit
e715eaba58
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'Generic Web Application DLL Injection',
|
||||
'Description' => %q{
|
||||
This is a general-purpose module for exploiting conditions where a HTTP request
|
||||
triggers a DLL load from a specified SMB share. This module serves payloads as
|
||||
triggers a DLL load from an specified SMB share. This module serves payloads as
|
||||
DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would
|
||||
trigger the load of the DLL.
|
||||
},
|
||||
|
|
|
@ -15,10 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Generic DLL Injection From Shared Resource',
|
||||
'Description' => %q{
|
||||
This is an example implementation of using the SMBFileServer module
|
||||
to serve an arbitrary DLL over SMB.
|
||||
This module will sit around waiting for a DLL to be loaded,
|
||||
for instance by the "payload/windows/loadlibrary" module.
|
||||
This is a general-purpose module for exploiting conditions where a DLL can be loaded
|
||||
from an specified SMB share. This module serves payloads as DLLs over an SMB service.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue