Land #2802, @todb-r7's mods before release

bug/bundler_fix
jvazquez-r7 2013-12-26 11:01:25 -06:00
commit 2ac02d3997
No known key found for this signature in database
GPG Key ID: 38D99152B9352D83
5 changed files with 8 additions and 7 deletions

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Identifies Open Chargen Service Checking The Answer.',
'Name' => 'Chargen Probe Utility',
'Description' => %q{
Chargen is a debugging and measurement tool and a character
generator service. A character generator service simply sends
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Auxiliary
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '1999-0103' ],
[ 'CVE', '1999-0103' ], # Note, does not actually trigger a flood.
[ 'URL', 'https://www.cert.be/pro/docs/chargensnmp-ddos-attacks-rise' ],
[ 'URL', 'http://tools.ietf.org/html/rfc864' ],
],

View File

@ -14,9 +14,9 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Poison Ivy C&C Scanner',
'Name' => 'Poison Ivy Command and Control Scanner',
'Description' => %q{
Enumerate Poison Ivy C&C on ports 3460,80,8080 and 443. Adaptation of iTrust Python script.
Enumerate Poison Ivy Command and Control (C&C) on ports 3460, 80, 8080 and 443. Adaptation of iTrust Python script.
},
'References' =>
[

View File

@ -28,8 +28,8 @@ class Metasploit3 < Msf::Auxiliary
],
'Author' =>
[
'Royce Davis @R3dy_ <rdavis[at]accuvant.com>',
'Brandon McCann @zeknox <bmccann[at]accuvant.com>'
'Royce Davis "R3dy" <rdavis[at]accuvant.com>',
'Brandon McCann "zeknox" <bmccann[at]accuvant.com>'
],
'License' => MSF_LICENSE
))

View File

@ -35,6 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2013-6955' ],
[ 'OSVDB', '101247' ]
],
'Privileged' => false,
'Platform' => ['unix'],

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Post
super( update_info( info,
'Name' => 'OSX Gather Safari LastSession.plist',
'Description' => %q{
This module downloads the LastSession.plist file from the target machine.
This module downloads the LastSession.plist file from the target machine.
LastSession.plist is used by Safari to track active websites in the current session,
and sometimes contains sensitive information such as usernames and passwords.