Actually describe the module in the title/description
parent
5f72a0a092
commit
2f55f08ebe
|
@ -5,6 +5,8 @@
|
||||||
# http://metasploit.com/framework/
|
# http://metasploit.com/framework/
|
||||||
##
|
##
|
||||||
|
|
||||||
|
# TODO: Split this module into two seperate SNMP and HTTP modules.
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
@ -14,12 +16,11 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'OKI Printer Scanner',
|
'Name' => 'OKI Printer Default Login Credential Scanner',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
Look for OKI printers on the network and try to connect to them as default
|
This module scans for OKI printers via SNMP, then tries to connect to found devices
|
||||||
admin credentials. By default OKI network printers use the last six digits of
|
with vendor default administrator credentials via HTTP authentication. By default, OKI
|
||||||
the MAC as admin password this addon will search for OKI printers on the network
|
network printers use the last six digits of the MAC as admin password.
|
||||||
and try to connect to them with the default password
|
|
||||||
},
|
},
|
||||||
'Author' => 'antr6X <anthr6x[at]gmail.com>',
|
'Author' => 'antr6X <anthr6x[at]gmail.com>',
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
|
@ -109,4 +110,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
rescue ::Exception => e
|
rescue ::Exception => e
|
||||||
print_status("Unknown error: #{e.class} #{e}")
|
print_status("Unknown error: #{e.class} #{e}")
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue