-
Notifications
You must be signed in to change notification settings - Fork 14k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
automatic module_metadata_base.json update
- Loading branch information
jenkins-metasploit
committed
Dec 7, 2024
1 parent
8618591
commit 3c9d698
Showing
1 changed file
with
3 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -216890,7 +216890,7 @@ | |
"Spencer McIntyre", | ||
"corelanc0d3r <[email protected]>" | ||
], | ||
"description": "Execute an x86 payload from a command via PowerShell.\n\nPerforms a TXT query against a series of DNS record(s) and executes the returned payload", | ||
"description": "Execute an x86 payload from a command via PowerShell.\n\nPerforms a TXT query against a series of DNS record(s) and executes the returned x86 shellcode. The DNSZONE\noption is used as the base name to iterate over. The payload will first request the TXT contents of the a\nhostname, followed by b, then c, etc. until there are no more records. For each record that is returned, exactly\n255 bytes from it are copied into a buffer that is eventually executed. This buffer should be encoded using\nx86/alpha_mixed with the BufferRegister option set to EDI.", | ||
"references": [ | ||
|
||
], | ||
|
@@ -245971,7 +245971,7 @@ | |
"author": [ | ||
"corelanc0d3r <[email protected]>" | ||
], | ||
"description": "Performs a TXT query against a series of DNS record(s) and executes the returned payload", | ||
"description": "Performs a TXT query against a series of DNS record(s) and executes the returned x86 shellcode. The DNSZONE\n option is used as the base name to iterate over. The payload will first request the TXT contents of the a\n hostname, followed by b, then c, etc. until there are no more records. For each record that is returned, exactly\n 255 bytes from it are copied into a buffer that is eventually executed. This buffer should be encoded using\n x86/alpha_mixed with the BufferRegister option set to EDI.", | ||
"references": [ | ||
|
||
], | ||
|
@@ -245981,7 +245981,7 @@ | |
"autofilter_ports": null, | ||
"autofilter_services": null, | ||
"targets": null, | ||
"mod_time": "2024-11-26 11:49:56 +0000", | ||
"mod_time": "2024-12-06 14:26:44 +0000", | ||
"path": "/modules/payloads/singles/windows/dns_txt_query_exec.rb", | ||
"is_install_path": true, | ||
"ref_name": "windows/dns_txt_query_exec", | ||
|