diff --git a/modules/exploits/windows/http/generic_http_dll_injection.rb b/modules/exploits/windows/http/generic_http_dll_injection.rb index 147cfd5731..04c5ae4b94 100644 --- a/modules/exploits/windows/http/generic_http_dll_injection.rb +++ b/modules/exploits/windows/http/generic_http_dll_injection.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Generic Web Application DLL Injection', 'Description' => %q{ This is a general-purpose module for exploiting conditions where a HTTP request - triggers a DLL load from a specified SMB share. This module serves payloads as + triggers a DLL load from an specified SMB share. This module serves payloads as DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would trigger the load of the DLL. }, diff --git a/modules/exploits/windows/smb/generic_smb_dll_injection.rb b/modules/exploits/windows/smb/generic_smb_dll_injection.rb index e3a5c1eb1f..760bcfd6d2 100644 --- a/modules/exploits/windows/smb/generic_smb_dll_injection.rb +++ b/modules/exploits/windows/smb/generic_smb_dll_injection.rb @@ -15,10 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Generic DLL Injection From Shared Resource', 'Description' => %q{ - This is an example implementation of using the SMBFileServer module - to serve an arbitrary DLL over SMB. - This module will sit around waiting for a DLL to be loaded, - for instance by the "payload/windows/loadlibrary" module. + This is a general-purpose module for exploiting conditions where a DLL can be loaded + from an specified SMB share. This module serves payloads as DLLs over an SMB service. }, 'Author' => [