From 0e3e7b594e5b16a0de592452c9cb09a05af8057b Mon Sep 17 00:00:00 2001 From: Metasploit Date: Mon, 25 Mar 2024 06:44:56 -0500 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 7d6058eb0b1f..8f8fbb351838 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -186365,7 +186365,7 @@ "MOF upload", "Command" ], - "mod_time": "2024-02-22 14:18:29 +0000", + "mod_time": "2024-03-25 10:53:08 +0000", "path": "/modules/exploits/windows/smb/smb_relay.rb", "is_install_path": true, "ref_name": "windows/smb/smb_relay", @@ -186390,11 +186390,11 @@ "actions": [ { "name": "CREATE_SMB_SESSION", - "description": "Get an SMB session" + "description": "Do not close the SMB connection after relaying, and instead create an SMB session" }, { "name": "PSEXEC", - "description": "Run psexec against the relay target" + "description": "Use the SMB Connection to run the exploit/windows/psexec module against the relay target" } ] },