Update description
parent
e155f2998e
commit
e715eaba58
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Name' => 'Generic Web Application DLL Injection',
|
'Name' => 'Generic Web Application DLL Injection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This is a general-purpose module for exploiting conditions where a HTTP request
|
This is a general-purpose module for exploiting conditions where a HTTP request
|
||||||
triggers a DLL load from a specified SMB share. This module serves payloads as
|
triggers a DLL load from an specified SMB share. This module serves payloads as
|
||||||
DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would
|
DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would
|
||||||
trigger the load of the DLL.
|
trigger the load of the DLL.
|
||||||
},
|
},
|
||||||
|
|
|
@ -15,10 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Generic DLL Injection From Shared Resource',
|
'Name' => 'Generic DLL Injection From Shared Resource',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This is an example implementation of using the SMBFileServer module
|
This is a general-purpose module for exploiting conditions where a DLL can be loaded
|
||||||
to serve an arbitrary DLL over SMB.
|
from an specified SMB share. This module serves payloads as DLLs over an SMB service.
|
||||||
This module will sit around waiting for a DLL to be loaded,
|
|
||||||
for instance by the "payload/windows/loadlibrary" module.
|
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
|
Loading…
Reference in New Issue