revisionism

GSoC/Meterpreter_Web_Console
Brendan Coles 2019-01-10 19:19:14 +00:00
parent aaaca59c19
commit 24f807490f
82 changed files with 82 additions and 82 deletions

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Auxiliary
This module has been tested successfully with ScadaBR
versions 1.0 CE and 0.9 on Windows and Ubuntu systems.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'References' => ['URL', 'http://www.scadabr.com.br/?q=node/1375'],
'Targets' => [[ 'Automatic', {} ]],

View File

@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
This module retrieves SIP and IAX2 user extensions and credentials from
Asterisk Call Manager service. Valid manager credentials are required.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'http://www.asterisk.name/sip1.html'],

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Auxiliary
Note: All tokens expire after 30 minutes of inactivity by default.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'https://doliforge.org/tracker/?func=detail&aid=1212&group_id=144'],

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Auxiliary
and extract the author's name from the document metadata.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>'))
'Author' => 'bcoles'))
register_options(
[
OptString.new('URL', [ false, 'The target URL', '' ]),

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Auxiliary
to become unresponsive until the server completes the request.
},
'Platform' => 'win',
'Author' => [ 'Brendan Coles <bcoles[at]gmail.com>' ],
'Author' => [ 'bcoles' ],
'License' => MSF_LICENSE,
'References' =>
[

View File

@ -18,7 +18,7 @@ class MetasploitModule < Msf::Auxiliary
This module has been tested successfully on TeamTalk versions
5.2.2.4885 and 5.2.3.4893.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
# Protocol documentation

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Auxiliary
'Author' =>
[
'Pedro Ribeiro <pedrib[at]gmail.com>', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # metasploit module
'bcoles' # metasploit module
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Auxiliary
[
['URL', 'http://news.netwinsite.com:8119/webnews?cmd=body&item=34896&group=netwin.surgemail'],
],
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'DisclosureDate' => 'Jun 16 2017'))
register_options [ Opt::RPORT(9080) ]
deregister_options 'RHOST'

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Auxiliary
'Author' =>
[
'R-73eN', # Vulnerability Discovery
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module
'bcoles' # Metasploit module
],
'References' =>
[

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Auxiliary
but does not support AUTHINFO GENERIC or AUTHINFO SASL
authentication methods.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'References' => [ [ 'CVE', '1999-0502' ], # Weak password
[ 'URL', 'https://tools.ietf.org/html/rfc3977' ],

View File

@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
Discover information from Web Services Dynamic Discovery (WS-Discovery)
enabled systems.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'References' =>
[

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Mike Baucom', 'Allen Harper', 'J. Rach', # Initial discovery by Tangible Security
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'Payload' =>
{

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Paul Davies (UHF-Satcom)', # Initial vulnerability discovery and PoC
'Andrew Tierney (Pen Test Partners)', # Independent vulnerability discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'linux',

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -32,7 +32,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Ivan Huertas', # Discovery and PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Arch' => ARCH_CMD,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
'bcoles', # Discovery and exploit
],
'References' =>
[

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
'bcoles', # Discovery and exploit
],
'License' => MSF_LICENSE,
'Privileged' => false,

View File

@ -34,7 +34,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Tavis Ormandy', # Discovery and C exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Apr 14 2015',
'Platform' => [ 'linux' ],

View File

@ -41,7 +41,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'rebel', # Discovery and chocobo_root.c exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Aug 12 2016',
'Platform' => [ 'linux' ],

View File

@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Andrey Konovalov', # Discovery and C exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Mar 29 2017',
'Platform' => [ 'linux' ],

View File

@ -40,7 +40,7 @@ class MetasploitModule < Msf::Exploit::Local
'Stéphane Graber', # Independent discovery, PoC and patch
'Tavis Ormandy', # Independent discovery and C exploit
'Ricardo F. Teixeira', # shell exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Mar 31 2015',
'Platform' => [ 'linux' ],

View File

@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Local
'zx2c4', # "I Can't Read and I Won't Race You Either" exploit
'Marco Ivaldi', # raptor_ldaudit and raptor_ldaudit2 exploits
'Todor Donev', # libmemusage.so exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 18 2010',
'Platform' => 'linux',

View File

@ -48,7 +48,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Tavis Ormandy', # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 18 2010',
'Platform' => 'linux',

View File

@ -34,7 +34,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'halfdog', # Discovery and RationalLove.c exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jan 16 2018',
'Platform' => [ 'linux' ],

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Ryan Beisner', # Discovery and PoC
'David Ames (@thedac)', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Apr 13 2017',
'Platform' => [ 'linux' ],

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
"King's Way", # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Feb 2 2016',
'References' =>

View File

@ -49,7 +49,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Qualys', # Discovery and C exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jul 24 2015',
'Platform' => [ 'linux' ],

View File

@ -36,7 +36,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Denis Andzakovic', # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jul 26 2018',
'References' =>

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Dan Rosenberg', # Discovery and C exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 20 2010',
'Platform' => [ 'linux' ],

View File

@ -43,7 +43,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Andrey Konovalov', # Discovery and C exploit
'h00die', # Metasploit module
'Brendan Coles' # Metasploit module
'bcoles' # Metasploit module
],
'DisclosureDate' => 'Aug 10 2017',
'Platform' => [ 'linux' ],

View File

@ -39,7 +39,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Jann Horn', # Discovery and PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'May 22 2017',
'Platform' => 'linux',

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Friedrich Postelstorfer', # Initial public disclosure and Python exploit
'jduck', # Independent discovery and C exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'unix',

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Ricky "HeadlessZeke" Lawshae', # Discovery
'coldfusion39', # VertXploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'linux',

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Zenofex', # Initial vulnerability discovery and PoC
'0x00string', # Initial vulnerability discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'linux',

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'steelo <knownsteelo[at]gmail.com>', # Vulnerability Discovery & Python Exploit
'hdm', # Metasploit Module
'Brendan Coles <bcoles[at]gmail.com>', # Check logic
'bcoles', # Check logic
],
'License' => MSF_LICENSE,
'References' =>

View File

@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [
'Stephane Chazelas', # Vulnerability discovery
'lcamtuf', # CVE-2014-6278
'Brendan Coles <bcoles[at]gmail.com>' # msf
'bcoles' # msf
],
'References' => [
[ 'CVE', '2014-6271' ],

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'AkaStep', # Discovery
'Brendan Coles <bcoles[at]gmail.com>' # metasploit exploit
'bcoles' # metasploit exploit
],
'References' =>
[

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
},
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'DefaultOptions' =>

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'SecuriTeam', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
the web interface.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['OSVDB', '99199'],

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
and version 3.2.0 on Debian Linux 8.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'http://wiki.processmaker.com/3.0/Plugin_Development']

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Daniel Lawson', # Discovery and exploit
'Romain Trouve', # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Sep 23 2016',
'Platform' => %w(linux solaris),

View File

@ -41,7 +41,7 @@ class MetasploitModule < Msf::Exploit::Local
'Narendra Shinde', # Discovery and exploit
'Raptor - 0xdea', # Modified exploit for cron
'Aaron Ringo', # Metasploit module
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module
'bcoles' # Metasploit module
],
'DisclosureDate' => 'Oct 25 2018',
'References' =>

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
4.14 on Windows 7 SP1.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
[ 'URL', 'https://help.rapid7.com/metasploit/Content/api/rpc/overview.html' ],

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'cenobyte', # Discovery and exploit
'Tim Brown', # Independent discovery
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'David Odell', # Discovery
'Mor!p3r', # PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -53,7 +53,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Shadow Brokers', # exploit
'Hacker Fantastic', # dtappgather-poc.sh
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Apr 24 2017',
'Privileged' => true,

View File

@ -51,7 +51,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'iDefense', # Discovery
'Marco Ivaldi', # Exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 11 2006',
'Privileged' => true,

View File

@ -57,7 +57,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Qualys Corporation', # Stack Clash technique and Solaris_rsh.c exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jun 19 2017',
'Privileged' => true,

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Bradley Austin (steponequit)', # Initial discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -38,7 +38,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Leandro Barragan', # Discovery and PoC
'Guido Leo', # Discovery and PoC
'Brendan Coles', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'David Odell', # Discovery
'Mor!p3r', # PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Benjamin Harris', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'x-hayben21', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Pichaya Morimoto', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'drone', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module
'bcoles' # Metasploit module
],
'References' =>
[

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Braeden Thomas', # Initial discovery + Piwik PoC
'Gjoko Krstic <gjoko[at]zeroscience.mk>', # OpenEMR PoC
'Halim Cruzito', # zonPHP PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'EgiX', # Discovery
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit
'bcoles' # msf exploit
],
'References' =>
[

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'AkaStep', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit
'bcoles' # msf exploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Fady Mohammed Osman', # Discovery and Exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'vinicius777[at]gmail.com', # Auth bypass discovery and PoC, kinda
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
and 2.13 RC1 on CentOS.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'http://www.vicidial.org/VICIDIALmantis/view.php?id=1016']

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
'bcoles', # Discovery and exploit
],
'License' => MSF_LICENSE,
'Privileged' => true,

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'mr_me <steven[at]srcincite.io>', # vulnerability discovery and exploit
'Brendan Coles <bcoles [at] gmail.com>', # hidden hta tricks!
'bcoles', # hidden hta tricks!
'sinn3r' # help with msf foo!
],
'References' =>

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'RjRjh Hack3r', # Original discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit
'bcoles' # msf exploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Serge Gorbunov', # Initial discovery
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'LSO <lso[at]hushmail.com>', # original metasploit
'Brendan Coles <bcoles[at]gmail.com>' # metasploit
'bcoles' # metasploit
],
'License' => BSD_LICENSE,
'References' =>

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'AkaStep', # Initial discovery
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Gjoko Krstic(LiquidWorm) <gjoko[at]zeroscience.mk>', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'sztivi', # Discovery
'Chris Lyne', # Python PoC (@lynerc)
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'sztivi', # Discovery
'Chris Lyne', # Python PoC (@lynerc)
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Mohamed Shetta <mshetta[at]live.com>', # Initial discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -19,7 +19,7 @@ module MetasploitModule
'Name' => 'Unix Command Shell, Reverse TCP (via Python)',
'Version' => '$Revision: 1 $',
'Description' => 'Connect back and create a command shell via Python',
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'Platform' => 'unix',
'Arch' => ARCH_CMD,

View File

@ -16,7 +16,7 @@ class MetasploitModule < Msf::Post
files in Microsoft Plus! 98 and Windows Me.
},
'License' => MSF_LICENSE,
'Author' => ['Brendan Coles <bcoles[at]gmail.com>'],
'Author' => ['bcoles'],
'References' =>
[
['CVE', '2001-0152'],

View File

@ -16,7 +16,7 @@ class MetasploitModule < Msf::Post
FTP client for Windows.
},
'License' => MSF_LICENSE,
'Author' => [ 'Brendan Coles <bcoles[at]gmail.com>' ],
'Author' => [ 'bcoles' ],
'Platform' => [ 'win' ],
'SessionTypes' => [ 'meterpreter' ]
))

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Post
'License' => MSF_LICENSE,
'Author' => [
'Joe Giron', # Discovery and PoC (@theonlyevil1)
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
'sinn3r' # shell session support
],
'References' =>