From 3c9d698103fc7071a1ffd39c0628bf721dcc5175 Mon Sep 17 00:00:00 2001 From: jenkins-metasploit Date: Sat, 7 Dec 2024 03:07:19 +0000 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 4b2e357aeb43..1cef13eaae6a 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -216890,7 +216890,7 @@ "Spencer McIntyre", "corelanc0d3r " ], - "description": "Execute an x86 payload from a command via PowerShell.\n\nPerforms a TXT query against a series of DNS record(s) and executes the returned payload", + "description": "Execute an x86 payload from a command via PowerShell.\n\nPerforms a TXT query against a series of DNS record(s) and executes the returned x86 shellcode. The DNSZONE\noption is used as the base name to iterate over. The payload will first request the TXT contents of the a\nhostname, followed by b, then c, etc. until there are no more records. For each record that is returned, exactly\n255 bytes from it are copied into a buffer that is eventually executed. This buffer should be encoded using\nx86/alpha_mixed with the BufferRegister option set to EDI.", "references": [ ], @@ -245971,7 +245971,7 @@ "author": [ "corelanc0d3r " ], - "description": "Performs a TXT query against a series of DNS record(s) and executes the returned payload", + "description": "Performs a TXT query against a series of DNS record(s) and executes the returned x86 shellcode. The DNSZONE\n option is used as the base name to iterate over. The payload will first request the TXT contents of the a\n hostname, followed by b, then c, etc. until there are no more records. For each record that is returned, exactly\n 255 bytes from it are copied into a buffer that is eventually executed. This buffer should be encoded using\n x86/alpha_mixed with the BufferRegister option set to EDI.", "references": [ ], @@ -245981,7 +245981,7 @@ "autofilter_ports": null, "autofilter_services": null, "targets": null, - "mod_time": "2024-11-26 11:49:56 +0000", + "mod_time": "2024-12-06 14:26:44 +0000", "path": "/modules/payloads/singles/windows/dns_txt_query_exec.rb", "is_install_path": true, "ref_name": "windows/dns_txt_query_exec",