Update description

bug/bundler_fix
jvazquez-r7 2015-03-04 16:39:27 -06:00
parent e155f2998e
commit e715eaba58
2 changed files with 3 additions and 5 deletions

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Generic Web Application DLL Injection', 'Name' => 'Generic Web Application DLL Injection',
'Description' => %q{ 'Description' => %q{
This is a general-purpose module for exploiting conditions where a HTTP request This is a general-purpose module for exploiting conditions where a HTTP request
triggers a DLL load from a specified SMB share. This module serves payloads as triggers a DLL load from an specified SMB share. This module serves payloads as
DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would
trigger the load of the DLL. trigger the load of the DLL.
}, },

View File

@ -15,10 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => 'Generic DLL Injection From Shared Resource', 'Name' => 'Generic DLL Injection From Shared Resource',
'Description' => %q{ 'Description' => %q{
This is an example implementation of using the SMBFileServer module This is a general-purpose module for exploiting conditions where a DLL can be loaded
to serve an arbitrary DLL over SMB. from an specified SMB share. This module serves payloads as DLLs over an SMB service.
This module will sit around waiting for a DLL to be loaded,
for instance by the "payload/windows/loadlibrary" module.
}, },
'Author' => 'Author' =>
[ [