This Metasploit module exploits the Wyse Rapport Hagent service and causes a remote power cycle.
22351b9d23464102ba3b26074487f1ff569c07be9c592ad7cff3d5dd6f17f981
This Metasploit module exploits the Wyse Rapport Hagent service by pretending to be a legitimate server. This process involves starting both HTTP and FTP services on the attacker side, then contacting the Hagent service of the target and indicating that an update is available. The target will then download the payload wrapped in an executable from the FTP service.
e7be07350ced9d99747f9c25b7062ad223b93cc2cecdcacbc714a84918ea9198