From f4c805f5d653c1ad25e0eaf6500df6a0dd69eaf0 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Fri, 28 Jun 2013 15:42:56 -0500 Subject: [PATCH] Yarrrrrrrrd --- lib/msf/core/post/windows/process.rb | 16 ++++++---------- 1 file changed, 6 insertions(+), 10 deletions(-) diff --git a/lib/msf/core/post/windows/process.rb b/lib/msf/core/post/windows/process.rb index 4215437934..bf4f2e5a4b 100644 --- a/lib/msf/core/post/windows/process.rb +++ b/lib/msf/core/post/windows/process.rb @@ -6,19 +6,15 @@ module Windows module Process - ## - # execute_shellcode(shellcode, shell_addr, pid) # - # Summary: - # Injects shellcode to a process, and executes it + # Injects shellcode to a process, and executes it. # - # Parameters: - # shellcode - The shellcode to execute - # base_addr - Tha base address to allocate memory - # pid - The process ID to inject to + # @param shellcode [String] The shellcode to execute + # @param base_addr [Fixnum] The base address to allocate memory + # @param pid [Fixnum] The process ID to inject to + # + # @return [Boolean] True if successful, otherwise false # - # Returns: - # true if successful, otherwise false ## def execute_shellcode(shellcode, base_addr, pid=nil) pid ||= session.sys.process.getpid