From 121ebdfef607d467b38f37affb15153039442f8c Mon Sep 17 00:00:00 2001 From: Jon Hart Date: Fri, 31 Oct 2014 13:17:50 -0700 Subject: [PATCH] update_info --- .../auxiliary/scanner/udp_scanner_template.rb | 35 ++++++++++--------- 1 file changed, 19 insertions(+), 16 deletions(-) diff --git a/modules/auxiliary/scanner/udp_scanner_template.rb b/modules/auxiliary/scanner/udp_scanner_template.rb index a880e1b96b..07eedc1385 100644 --- a/modules/auxiliary/scanner/udp_scanner_template.rb +++ b/modules/auxiliary/scanner/udp_scanner_template.rb @@ -9,23 +9,26 @@ class Metasploit3 < Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Auxiliary::UDPScanner - def initialize + def initialize(info = {}) super( - # TODO: fill in all of this - 'Name' => 'UDP Scanner Example', - 'Description' => %q( - This module is an example of how to send probes to UDP services - en-masse, analyze any responses, and then report on any discovered - hosts, services, vulnerabilities or otherwise noteworthy things. - Simply address any of the TODOs. - ), - 'Author' => 'Joe Contributor ', - 'References' => - [ - ['URL', 'https://example.com/~jcontributor'] - ], - 'DisclosureDate' => 'Mar 15 2014', - 'License' => MSF_LICENSE + update_info( + info, + # TODO: fill in all of this + 'Name' => 'UDP Scanner Example', + 'Description' => %q( + This module is an example of how to send probes to UDP services + en-masse, analyze any responses, and then report on any discovered + hosts, services, vulnerabilities or otherwise noteworthy things. + Simply address any of the TODOs. + ), + 'Author' => 'Joe Contributor ', + 'References' => + [ + ['URL', 'https://example.com/~jcontributor'] + ], + 'DisclosureDate' => 'Mar 15 2014', + 'License' => MSF_LICENSE + ) ) register_options(