diff --git a/modules/exploits/windows/local/linqpad_deserialization_persistence.rb b/modules/exploits/windows/persistence/linqpad_deserialization_persistence.rb similarity index 98% rename from modules/exploits/windows/local/linqpad_deserialization_persistence.rb rename to modules/exploits/windows/persistence/linqpad_deserialization_persistence.rb index 586a8a8607766..15a471a38df91 100644 --- a/modules/exploits/windows/local/linqpad_deserialization_persistence.rb +++ b/modules/exploits/windows/persistence/linqpad_deserialization_persistence.rb @@ -16,7 +16,7 @@ def initialize(info = {}) super( update_info( info, - 'Name' => 'LINQPad Deserialization Exploit', + 'Name' => 'LINQPad Deserialization Persistence', 'Description' => %q{ This module exploits a bug in LIQPad up to version 5.48.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts. },