Skip to content

Commit f193caa

Browse files
committed
Also make sure that the default option is to use Windows Powershell since this supports Meterpreter and is generally a lot more reliable
1 parent d739bf7 commit f193caa

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

documentation/modules/exploit/windows/http/hpe_sim_76_amf_deserialization.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ This module exploits this vulnerability by leveraging an outdated copy of Common
4646

4747
```
4848
msf6 > use exploit/windows/http/hpe_sim_76_amf_deserialization
49-
[*] No payload configured, defaulting to cmd/windows/powershell_reverse_tcp
49+
[*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp
5050
msf6 exploit(windows/http/hpe_sim_76_amf_deserialization) > set TARGET 1
5151
TARGET => 1
5252
msf6 exploit(windows/http/hpe_sim_76_amf_deserialization) > set PAYLOAD windows/x64/meterpreter/bind_tcp

modules/exploits/windows/http/hpe_sim_76_amf_deserialization.rb

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ def initialize(info = {})
5858
'RPORT' => 50000,
5959
'SSL' => true
6060
},
61-
'DefaultTarget' => 0,
61+
'DefaultTarget' => 1,
6262
'DisclosureDate' => '2020-12-15',
6363
'Notes' =>
6464
{

0 commit comments

Comments
 (0)