Land #2802, @todb-r7's mods before release
commit
2ac02d3997
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'Identifies Open Chargen Service Checking The Answer.',
|
||||
'Name' => 'Chargen Probe Utility',
|
||||
'Description' => %q{
|
||||
Chargen is a debugging and measurement tool and a character
|
||||
generator service. A character generator service simply sends
|
||||
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '1999-0103' ],
|
||||
[ 'CVE', '1999-0103' ], # Note, does not actually trigger a flood.
|
||||
[ 'URL', 'https://www.cert.be/pro/docs/chargensnmp-ddos-attacks-rise' ],
|
||||
[ 'URL', 'http://tools.ietf.org/html/rfc864' ],
|
||||
],
|
||||
|
|
|
@ -14,9 +14,9 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'Poison Ivy C&C Scanner',
|
||||
'Name' => 'Poison Ivy Command and Control Scanner',
|
||||
'Description' => %q{
|
||||
Enumerate Poison Ivy C&C on ports 3460,80,8080 and 443. Adaptation of iTrust Python script.
|
||||
Enumerate Poison Ivy Command and Control (C&C) on ports 3460, 80, 8080 and 443. Adaptation of iTrust Python script.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -28,8 +28,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
],
|
||||
'Author' =>
|
||||
[
|
||||
'Royce Davis @R3dy_ <rdavis[at]accuvant.com>',
|
||||
'Brandon McCann @zeknox <bmccann[at]accuvant.com>'
|
||||
'Royce Davis "R3dy" <rdavis[at]accuvant.com>',
|
||||
'Brandon McCann "zeknox" <bmccann[at]accuvant.com>'
|
||||
],
|
||||
'License' => MSF_LICENSE
|
||||
))
|
||||
|
|
|
@ -35,6 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2013-6955' ],
|
||||
[ 'OSVDB', '101247' ]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['unix'],
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Post
|
|||
super( update_info( info,
|
||||
'Name' => 'OSX Gather Safari LastSession.plist',
|
||||
'Description' => %q{
|
||||
This module downloads the LastSession.plist file from the target machine.
|
||||
This module downloads the LastSession.plist file from the target machine.
|
||||
LastSession.plist is used by Safari to track active websites in the current session,
|
||||
and sometimes contains sensitive information such as usernames and passwords.
|
||||
|
||||
|
|
Loading…
Reference in New Issue