diff --git a/documentation/modules/exploit/windows/http/trend_micro_officescan_widget_exec.md b/documentation/modules/exploit/windows/http/trendmicro_officescan_widget_exec.md similarity index 98% rename from documentation/modules/exploit/windows/http/trend_micro_officescan_widget_exec.md rename to documentation/modules/exploit/windows/http/trendmicro_officescan_widget_exec.md index ecbeb9e126..2cf1fc638a 100644 --- a/documentation/modules/exploit/windows/http/trend_micro_officescan_widget_exec.md +++ b/documentation/modules/exploit/windows/http/trendmicro_officescan_widget_exec.md @@ -32,6 +32,8 @@ A successful check of the exploit will look like this: ## Scenarios +### Trend Micro OfficeScan 11 on Win7 + ``` msf exploit(trendmicro_officescan_widget_exec) > exploit @@ -55,4 +57,4 @@ Logged On Users : 1 Meterpreter : x86/windows meterpreter > -``` \ No newline at end of file +```