diff --git a/lib/msf/core/db.rb b/lib/msf/core/db.rb index 030c1d9aad..1749c08b4e 100644 --- a/lib/msf/core/db.rb +++ b/lib/msf/core/db.rb @@ -675,6 +675,13 @@ class DBManager if sess_data[:desc] sess_data[:desc] = sess_data[:desc][0,255] end + + # In the case of multi handler we cannot yet determine the true + # exploit responsible. But we can at least show the parent versus + # just the generic handler: + if session.via_exploit == "exploit/multi/handler" + sess_data[:via_exploit] = sess_data[:datastore]['ParentModule'] + end s = ::Mdm::Session.new(sess_data) s.save! @@ -684,19 +691,26 @@ class DBManager end # If this is a live session, we know the host is vulnerable to something. - # If the exploit used was multi/handler, though, we don't know what - # it's vulnerable to, so it isn't really useful to save it. - if opts[:session] and session.via_exploit and session.via_exploit != "exploit/multi/handler" + if opts[:session] and session.via_exploit return unless host mod = framework.modules.create(session.via_exploit) + + if session.via_exploit == "exploit/multi/handler" + mod_fullname = sess_data[:datastore]['ParentModule'] + mod_name = ::Mdm::ModuleDetail.find_by_fullname(mod_fullname).name + else + mod_name = mod.name + mod_fullname = mod.fullname + end + vuln_info = { :host => host.address, - :name => mod.name, + :name => mod_name, :refs => mod.references, :workspace => wspace, :exploited_at => Time.now.utc, - :info => "Exploited by #{mod.fullname} to create Session #{s.id}" + :info => "Exploited by #{mod_fullname} to create Session #{s.id}" } port = session.exploit_datastore["RPORT"] @@ -706,10 +720,15 @@ class DBManager vuln = framework.db.report_vuln(vuln_info) + if session.via_exploit == "exploit/multi/handler" + via_exploit = sess_data[:datastore]['ParentModule'] + else + via_exploit = session.via_exploit + end attempt_info = { :timestamp => Time.now.utc, :workspace => wspace, - :module => session.via_exploit, + :module => via_exploit, :username => session.username, :refs => mod.references, :session_id => s.id, diff --git a/modules/auxiliary/admin/2wire/xslt_password_reset.rb b/modules/auxiliary/admin/2wire/xslt_password_reset.rb index 19c42c0bd9..4b33085ce0 100644 --- a/modules/auxiliary/admin/2wire/xslt_password_reset.rb +++ b/modules/auxiliary/admin/2wire/xslt_password_reset.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary configuration changes (such as resetting the password) as administrators. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'Author' => [ 'hkm [at] hakim.ws', #Initial discovery, poc diff --git a/modules/auxiliary/admin/backupexec/dump.rb b/modules/auxiliary/admin/backupexec/dump.rb index 2f7f2d7873..b76e345dcf 100644 --- a/modules/auxiliary/admin/backupexec/dump.rb +++ b/modules/auxiliary/admin/backupexec/dump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm', 'Unknown' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2005-2611'], diff --git a/modules/auxiliary/admin/backupexec/registry.rb b/modules/auxiliary/admin/backupexec/registry.rb index 349a804311..042bf8cdf8 100644 --- a/modules/auxiliary/admin/backupexec/registry.rb +++ b/modules/auxiliary/admin/backupexec/registry.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '17627' ], diff --git a/modules/auxiliary/admin/cisco/cisco_secure_acs_bypass.rb b/modules/auxiliary/admin/cisco/cisco_secure_acs_bypass.rb index 82786e097c..7333067af6 100644 --- a/modules/auxiliary/admin/cisco/cisco_secure_acs_bypass.rb +++ b/modules/auxiliary/admin/cisco/cisco_secure_acs_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'Cisco Secure ACS Version < 5.1.0.44.5 or 5.2.0.26.2 Unauthorized Password Change', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits an authentication bypass issue which allows arbitrary password change requests to be issued for any user in the local store. diff --git a/modules/auxiliary/admin/cisco/vpn_3000_ftp_bypass.rb b/modules/auxiliary/admin/cisco/vpn_3000_ftp_bypass.rb index 5992230732..b0890ea45e 100644 --- a/modules/auxiliary/admin/cisco/vpn_3000_ftp_bypass.rb +++ b/modules/auxiliary/admin/cisco/vpn_3000_ftp_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '19680' ], diff --git a/modules/auxiliary/admin/db2/db2rcmd.rb b/modules/auxiliary/admin/db2/db2rcmd.rb index 889389947a..eb31630122 100644 --- a/modules/auxiliary/admin/db2/db2rcmd.rb +++ b/modules/auxiliary/admin/db2/db2rcmd.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-0795' ], diff --git a/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb b/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb index 6c3dae81c3..c15610dee7 100644 --- a/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb +++ b/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary ['OSVDB', '60035'], ], 'Author' => 'hdm', - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ diff --git a/modules/auxiliary/admin/emc/alphastor_devicemanager_exec.rb b/modules/auxiliary/admin/emc/alphastor_devicemanager_exec.rb index 895db730f3..b26da0d33d 100644 --- a/modules/auxiliary/admin/emc/alphastor_devicemanager_exec.rb +++ b/modules/auxiliary/admin/emc/alphastor_devicemanager_exec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ], diff --git a/modules/auxiliary/admin/emc/alphastor_librarymanager_exec.rb b/modules/auxiliary/admin/emc/alphastor_librarymanager_exec.rb index 24f240795a..d83dcec60c 100644 --- a/modules/auxiliary/admin/emc/alphastor_librarymanager_exec.rb +++ b/modules/auxiliary/admin/emc/alphastor_librarymanager_exec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ], diff --git a/modules/auxiliary/admin/ftp/titanftp_xcrc_traversal.rb b/modules/auxiliary/admin/ftp/titanftp_xcrc_traversal.rb index e25693f213..476ccc65f2 100644 --- a/modules/auxiliary/admin/ftp/titanftp_xcrc_traversal.rb +++ b/modules/auxiliary/admin/ftp/titanftp_xcrc_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -34,7 +30,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'jduck', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '65533'], diff --git a/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb b/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb index 7331ec37d6..ab94edb661 100644 --- a/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb +++ b/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'ContentKeeper Web Appliance mimencode File Access', - 'Version' => '$Revision$', 'Description' => %q{ This module abuses the 'mimencode' binary present within ContentKeeper Web filtering appliances to retrieve arbitrary diff --git a/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb b/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb index c3588f89b9..4d4cd801b1 100644 --- a/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb +++ b/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '5798' ], diff --git a/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb b/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb index f779477cf0..cfeb05caa3 100644 --- a/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb +++ b/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Iomega StorCenter Pro NAS Web Authentication Bypass', - 'Version' => '$Revision$', 'Description' => %q{ The Iomega StorCenter Pro Network Attached Storage device web interface increments sessions IDs, allowing for simple brute force attacks to bypass authentication and gain administrative diff --git a/modules/auxiliary/admin/http/tomcat_administration.rb b/modules/auxiliary/admin/http/tomcat_administration.rb index 587196a6f9..a7b491a9fc 100644 --- a/modules/auxiliary/admin/http/tomcat_administration.rb +++ b/modules/auxiliary/admin/http/tomcat_administration.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Tomcat Administration Tool Default Access', - 'Version' => '$Revision$', 'Description' => 'Detect the Tomcat administration interface.', 'References' => [ diff --git a/modules/auxiliary/admin/http/tomcat_utf8_traversal.rb b/modules/auxiliary/admin/http/tomcat_utf8_traversal.rb index 65f36f19fb..c274b87aa8 100644 --- a/modules/auxiliary/admin/http/tomcat_utf8_traversal.rb +++ b/modules/auxiliary/admin/http/tomcat_utf8_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability', - 'Version' => '$Revision$', 'Description' => %q{ This module tests whether a directory traversal vulnerablity is present in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0 diff --git a/modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb b/modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb index f74a15c939..831efcdb24 100644 --- a/modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb +++ b/modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal', - 'Version' => '$Revision$', 'Description' => %q{ This module tests whether a directory traversal vulnerablity is present in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294. diff --git a/modules/auxiliary/admin/http/typo3_sa_2009_001.rb b/modules/auxiliary/admin/http/typo3_sa_2009_001.rb index 312158392f..b1c6aa786c 100644 --- a/modules/auxiliary/admin/http/typo3_sa_2009_001.rb +++ b/modules/auxiliary/admin/http/typo3_sa_2009_001.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'TYPO3 sa-2009-001 Weak Encryption Key File Disclosure', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits a flaw in TYPO3 encryption ey creation process to allow for file disclosure in the jumpUrl mechanism. This flaw can be used to read any file diff --git a/modules/auxiliary/admin/http/typo3_sa_2009_002.rb b/modules/auxiliary/admin/http/typo3_sa_2009_002.rb index 81e1112400..948a3e673d 100644 --- a/modules/auxiliary/admin/http/typo3_sa_2009_002.rb +++ b/modules/auxiliary/admin/http/typo3_sa_2009_002.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'spinbad ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '52048'], diff --git a/modules/auxiliary/admin/http/typo3_sa_2010_020.rb b/modules/auxiliary/admin/http/typo3_sa_2010_020.rb index 5a9c9b7390..993d4f4f0f 100644 --- a/modules/auxiliary/admin/http/typo3_sa_2010_020.rb +++ b/modules/auxiliary/admin/http/typo3_sa_2010_020.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'TYPO3 sa-2010-020 Remote File Disclosure', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits a flaw in the way the TYPO3 jumpurl feature matches hashes. Due to this flaw a Remote File Disclosure is possible by matching the juhash of 0. diff --git a/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb b/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb index 7fef9a1edf..4630d40894 100644 --- a/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb +++ b/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'TYPO3 Winstaller default Encryption Keys', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits known default encryption keys found in the TYPO3 Winstaller. This flaw allows for file disclosure in the jumpUrl mechanism. This issue can be diff --git a/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb b/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb index 4a504fd646..9cb5390922 100644 --- a/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb +++ b/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '40210' ], diff --git a/modules/auxiliary/admin/motorola/wr850g_cred.rb b/modules/auxiliary/admin/motorola/wr850g_cred.rb index 1da7df6574..968ada625b 100644 --- a/modules/auxiliary/admin/motorola/wr850g_cred.rb +++ b/modules/auxiliary/admin/motorola/wr850g_cred.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2004-1550' ], [ 'OSVDB', '10232' ], diff --git a/modules/auxiliary/admin/ms/ms08_059_his2006.rb b/modules/auxiliary/admin/ms/ms08_059_his2006.rb index c2c241eba3..5975cb86f4 100644 --- a/modules/auxiliary/admin/ms/ms08_059_his2006.rb +++ b/modules/auxiliary/admin/ms/ms08_059_his2006.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'MSB', 'MS08-059' ], diff --git a/modules/auxiliary/admin/mssql/mssql_enum.rb b/modules/auxiliary/admin/mssql/mssql_enum.rb index b439673ef8..ad63351a74 100644 --- a/modules/auxiliary/admin/mssql/mssql_enum.rb +++ b/modules/auxiliary/admin/mssql/mssql_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary supplied. }, 'Author' => [ 'Carlos Perez ' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/admin/mssql/mssql_exec.rb b/modules/auxiliary/admin/mssql/mssql_exec.rb index 9c338000ec..b70975a410 100644 --- a/modules/auxiliary/admin/mssql/mssql_exec.rb +++ b/modules/auxiliary/admin/mssql/mssql_exec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'tebo ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://msdn.microsoft.com/en-us/library/cc448435(PROT.10).aspx'], diff --git a/modules/auxiliary/admin/mssql/mssql_idf.rb b/modules/auxiliary/admin/mssql/mssql_idf.rb index 278fc84034..7bf3f9f42e 100644 --- a/modules/auxiliary/admin/mssql/mssql_idf.rb +++ b/modules/auxiliary/admin/mssql/mssql_idf.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # Author: Robin Wood # Version: 0.1 @@ -38,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Robin Wood ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.digininja.org/metasploit/mssql_idf.php' ], diff --git a/modules/auxiliary/admin/mssql/mssql_sql.rb b/modules/auxiliary/admin/mssql/mssql_sql.rb index 75697d4cff..5ed7e39f32 100644 --- a/modules/auxiliary/admin/mssql/mssql_sql.rb +++ b/modules/auxiliary/admin/mssql/mssql_sql.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'tebo ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.attackresearch.com' ], diff --git a/modules/auxiliary/admin/mysql/mysql_enum.rb b/modules/auxiliary/admin/mysql/mysql_enum.rb index abe182ae60..62517dba8c 100644 --- a/modules/auxiliary/admin/mysql/mysql_enum.rb +++ b/modules/auxiliary/admin/mysql/mysql_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Carlos Perez ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'https://cisecurity.org/benchmarks.html' ] diff --git a/modules/auxiliary/admin/mysql/mysql_sql.rb b/modules/auxiliary/admin/mysql/mysql_sql.rb index 539a2f89e4..d4a5dcb96d 100644 --- a/modules/auxiliary/admin/mysql/mysql_sql.rb +++ b/modules/auxiliary/admin/mysql/mysql_sql.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary against a MySQL instance given the appropriate credentials. }, 'Author' => [ 'Bernardo Damele A. G. ' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( diff --git a/modules/auxiliary/admin/officescan/tmlisten_traversal.rb b/modules/auxiliary/admin/officescan/tmlisten_traversal.rb index edc05e66b0..698af5acfe 100644 --- a/modules/auxiliary/admin/officescan/tmlisten_traversal.rb +++ b/modules/auxiliary/admin/officescan/tmlisten_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'TrendMicro OfficeScanNT Listener Traversal Arbitrary File Access', - 'Version' => '$Revision$', 'Description' => %q{ This module tests for directory traversal vulnerability in the UpdateAgent function in the OfficeScanNT Listener (TmListen.exe) service in Trend Micro diff --git a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb index d86eea29e6..f50d28e88e 100644 --- a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb +++ b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Sh2kerr ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://dsecrg.com/pages/pub/show.php?id=17' ], diff --git a/modules/auxiliary/admin/oracle/oracle_login.rb b/modules/auxiliary/admin/oracle/oracle_login.rb index 34d0111e52..e5ebb671eb 100644 --- a/modules/auxiliary/admin/oracle/oracle_login.rb +++ b/modules/auxiliary/admin/oracle/oracle_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.petefinnigan.com/default/oracle_default_passwords.csv' ], diff --git a/modules/auxiliary/admin/oracle/oracle_sql.rb b/modules/auxiliary/admin/oracle/oracle_sql.rb index 62904cb51a..f3da70fafe 100644 --- a/modules/auxiliary/admin/oracle/oracle_sql.rb +++ b/modules/auxiliary/admin/oracle/oracle_sql.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'https://www.metasploit.com/users/mc' ], diff --git a/modules/auxiliary/admin/oracle/oraenum.rb b/modules/auxiliary/admin/oracle/oraenum.rb index 52b78aba4e..355047acc7 100644 --- a/modules/auxiliary/admin/oracle/oraenum.rb +++ b/modules/auxiliary/admin/oracle/oraenum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary run. }, 'Author' => [ 'Carlos Perez ' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/admin/oracle/osb_execqr.rb b/modules/auxiliary/admin/oracle/osb_execqr.rb index e4bcae8907..238ea058ae 100644 --- a/modules/auxiliary/admin/oracle/osb_execqr.rb +++ b/modules/auxiliary/admin/oracle/osb_execqr.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5448' ], diff --git a/modules/auxiliary/admin/oracle/osb_execqr2.rb b/modules/auxiliary/admin/oracle/osb_execqr2.rb index 89ee779b4f..52c28488c5 100644 --- a/modules/auxiliary/admin/oracle/osb_execqr2.rb +++ b/modules/auxiliary/admin/oracle/osb_execqr2.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1977' ], diff --git a/modules/auxiliary/admin/oracle/osb_execqr3.rb b/modules/auxiliary/admin/oracle/osb_execqr3.rb index 0dd1d8d660..7b986fc512 100644 --- a/modules/auxiliary/admin/oracle/osb_execqr3.rb +++ b/modules/auxiliary/admin/oracle/osb_execqr3.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0904' ], diff --git a/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb b/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb index 63056cf04b..2780857532 100644 --- a/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb +++ b/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'https://www.metasploit.com/users/mc' ], diff --git a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb index 5c101fff3d..0a53dc67af 100644 --- a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb +++ b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'CG' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.argeniss.com/research/oraclesqlinj.zip' ], diff --git a/modules/auxiliary/admin/oracle/sid_brute.rb b/modules/auxiliary/admin/oracle/sid_brute.rb index 34e8440607..b46622dfb8 100644 --- a/modules/auxiliary/admin/oracle/sid_brute.rb +++ b/modules/auxiliary/admin/oracle/sid_brute.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'https://www.metasploit.com/users/mc' ], diff --git a/modules/auxiliary/admin/oracle/tnscmd.rb b/modules/auxiliary/admin/oracle/tnscmd.rb index 191c19afa4..df28ef1bca 100644 --- a/modules/auxiliary/admin/oracle/tnscmd.rb +++ b/modules/auxiliary/admin/oracle/tnscmd.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => ['MC'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'DisclosureDate' => 'Feb 1 2009' )) diff --git a/modules/auxiliary/admin/pop2/uw_fileretrieval.rb b/modules/auxiliary/admin/pop2/uw_fileretrieval.rb index ce5296b53d..d9e489ceed 100644 --- a/modules/auxiliary/admin/pop2/uw_fileretrieval.rb +++ b/modules/auxiliary/admin/pop2/uw_fileretrieval.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '368' ], diff --git a/modules/auxiliary/admin/postgres/postgres_readfile.rb b/modules/auxiliary/admin/postgres/postgres_readfile.rb index bcccfa6b75..9a5d5b1bfb 100644 --- a/modules/auxiliary/admin/postgres/postgres_readfile.rb +++ b/modules/auxiliary/admin/postgres/postgres_readfile.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ [ 'URL', 'http://michaeldaw.org/sql-injection-cheat-sheet#postgres' ] - ], - 'Version' => '$Revision$' + ] )) register_options( diff --git a/modules/auxiliary/admin/postgres/postgres_sql.rb b/modules/auxiliary/admin/postgres/postgres_sql.rb index 5bb3894345..a79f137279 100644 --- a/modules/auxiliary/admin/postgres/postgres_sql.rb +++ b/modules/auxiliary/admin/postgres/postgres_sql.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ [ 'URL', 'www.postgresql.org' ] - ], - 'Version' => '$Revision$' + ] )) #register_options( [ ], self.class) # None needed. diff --git a/modules/auxiliary/admin/sap/sap_mgmt_con_osexec.rb b/modules/auxiliary/admin/sap/sap_mgmt_con_osexec.rb index 8538203de9..d70b39b62b 100644 --- a/modules/auxiliary/admin/sap/sap_mgmt_con_osexec.rb +++ b/modules/auxiliary/admin/sap/sap_mgmt_con_osexec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console OSExecute', - 'Version' => '$Revision$', 'Description' => %q{ This module allows execution of operating system commands through the SAP Management Console SOAP Interface. A valid username and password must be diff --git a/modules/auxiliary/admin/scada/igss_exec_17.rb b/modules/auxiliary/admin/scada/igss_exec_17.rb index 00785bf316..49dd120ba0 100644 --- a/modules/auxiliary/admin/scada/igss_exec_17.rb +++ b/modules/auxiliary/admin/scada/igss_exec_17.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Luigi Auriemma', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1566'], diff --git a/modules/auxiliary/admin/scada/modicon_command.rb b/modules/auxiliary/admin/scada/modicon_command.rb index 5729b6ed15..6881b15080 100644 --- a/modules/auxiliary/admin/scada/modicon_command.rb +++ b/modules/auxiliary/admin/scada/modicon_command.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary [ [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] ], - 'Version' => '$Revision$', 'DisclosureDate' => 'Apr 5 2012' )) register_options( diff --git a/modules/auxiliary/admin/scada/modicon_password_recovery.rb b/modules/auxiliary/admin/scada/modicon_password_recovery.rb index 6a911e0df3..4492b48c01 100644 --- a/modules/auxiliary/admin/scada/modicon_password_recovery.rb +++ b/modules/auxiliary/admin/scada/modicon_password_recovery.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary [ [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] ], - 'Version' => '$Revision$', 'DisclosureDate'=> 'Jan 19 2012' )) diff --git a/modules/auxiliary/admin/scada/modicon_stux_transfer.rb b/modules/auxiliary/admin/scada/modicon_stux_transfer.rb index ec03727174..dbbda3a618 100644 --- a/modules/auxiliary/admin/scada/modicon_stux_transfer.rb +++ b/modules/auxiliary/admin/scada/modicon_stux_transfer.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Auxiliary [ [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] ], - 'Version' => '$Revision$', 'DisclosureDate' => 'Apr 5 2012' )) diff --git a/modules/auxiliary/admin/scada/multi_cip_command.rb b/modules/auxiliary/admin/scada/multi_cip_command.rb index 7b96f8c243..61b1ea6725 100644 --- a/modules/auxiliary/admin/scada/multi_cip_command.rb +++ b/modules/auxiliary/admin/scada/multi_cip_command.rb @@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary [ [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] ], - 'Version' => '$Revision$', 'DisclosureDate' => 'Jan 19 2012')) register_options( diff --git a/modules/auxiliary/admin/serverprotect/file.rb b/modules/auxiliary/admin/serverprotect/file.rb index 6d402b75c2..99e3958e02 100644 --- a/modules/auxiliary/admin/serverprotect/file.rb +++ b/modules/auxiliary/admin/serverprotect/file.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'toto' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-6507' ], diff --git a/modules/auxiliary/admin/smb/check_dir_file.rb b/modules/auxiliary/admin/smb/check_dir_file.rb index 97c8706f73..2f2ede0511 100644 --- a/modules/auxiliary/admin/smb/check_dir_file.rb +++ b/modules/auxiliary/admin/smb/check_dir_file.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB Scanner Check File/Directory Utility', - 'Version' => '$Revision$', 'Description' => %Q{ This module is useful when checking an entire network of SMB hosts for the presence of a known file or directory. diff --git a/modules/auxiliary/admin/smb/list_directory.rb b/modules/auxiliary/admin/smb/list_directory.rb index cea6e9d7a6..0fdcc1bcad 100644 --- a/modules/auxiliary/admin/smb/list_directory.rb +++ b/modules/auxiliary/admin/smb/list_directory.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB Directory Listing Utility', - 'Version' => '$Revision$', 'Description' => %Q{ This module lists the directory of a target share and path. The only reason to use this module is if your existing SMB client is not able to support the features diff --git a/modules/auxiliary/admin/smb/samba_symlink_traversal.rb b/modules/auxiliary/admin/smb/samba_symlink_traversal.rb index 547f40f145..51e573a53f 100644 --- a/modules/auxiliary/admin/smb/samba_symlink_traversal.rb +++ b/modules/auxiliary/admin/smb/samba_symlink_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Samba Symlink Directory Traversal', - 'Version' => '$Revision$', 'Description' => %Q{ This module exploits a directory traversal flaw in the Samba CIFS server. To exploit this flaw, a writeable share must be specified. diff --git a/modules/auxiliary/admin/smb/upload_file.rb b/modules/auxiliary/admin/smb/upload_file.rb index a661994fea..05c59a80f2 100644 --- a/modules/auxiliary/admin/smb/upload_file.rb +++ b/modules/auxiliary/admin/smb/upload_file.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB File Upload Utility', - 'Version' => '$Revision$', 'Description' => %Q{ This module uploads a file to a target share and path. The only reason to use this module is if your existing SMB client is not able to support the features diff --git a/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb b/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb index 9b25f90db8..c0b7da036c 100644 --- a/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb +++ b/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -35,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary 'jduck' # Ported to MSF v3 ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2003-0027'], diff --git a/modules/auxiliary/admin/tikiwiki/tikidblib.rb b/modules/auxiliary/admin/tikiwiki/tikidblib.rb index b8b060f594..2b7c008f4b 100644 --- a/modules/auxiliary/admin/tikiwiki/tikidblib.rb +++ b/modules/auxiliary/admin/tikiwiki/tikidblib.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Matteo Cantoni ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '30172'], diff --git a/modules/auxiliary/admin/vmware/poweroff_vm.rb b/modules/auxiliary/admin/vmware/poweroff_vm.rb index 3dc28f3c2e..a6c5673815 100644 --- a/modules/auxiliary/admin/vmware/poweroff_vm.rb +++ b/modules/auxiliary/admin/vmware/poweroff_vm.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/admin/vmware/poweron_vm.rb b/modules/auxiliary/admin/vmware/poweron_vm.rb index 02adc9de8a..4fa05fae59 100644 --- a/modules/auxiliary/admin/vmware/poweron_vm.rb +++ b/modules/auxiliary/admin/vmware/poweron_vm.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/admin/vmware/tag_vm.rb b/modules/auxiliary/admin/vmware/tag_vm.rb index 15707975e5..dc9d56a43a 100644 --- a/modules/auxiliary/admin/vmware/tag_vm.rb +++ b/modules/auxiliary/admin/vmware/tag_vm.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb b/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb index d3936bbd78..21f21b7887 100644 --- a/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb +++ b/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/admin/vnc/realvnc_41_bypass.rb b/modules/auxiliary/admin/vnc/realvnc_41_bypass.rb index 102bff1018..c23633df4f 100644 --- a/modules/auxiliary/admin/vnc/realvnc_41_bypass.rb +++ b/modules/auxiliary/admin/vnc/realvnc_41_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary 'theLightCosine' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['BID', '17978'], diff --git a/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb b/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb index c951f00f91..e715f1abfc 100644 --- a/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb +++ b/modules/auxiliary/admin/vxworks/apple_airport_extreme_password.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '66842'], diff --git a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb index 50bf6540ce..26c99bba1a 100644 --- a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb +++ b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '66842'], diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb index 061bec32f2..174339dc1a 100644 --- a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb +++ b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '66842'], diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb index 2168cc872e..a893d75ae3 100644 --- a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb +++ b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '66842'], diff --git a/modules/auxiliary/admin/webmin/file_disclosure.rb b/modules/auxiliary/admin/webmin/file_disclosure.rb index 7818eba7cb..4bcbf89d22 100644 --- a/modules/auxiliary/admin/webmin/file_disclosure.rb +++ b/modules/auxiliary/admin/webmin/file_disclosure.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Matteo Cantoni ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '26772'], diff --git a/modules/auxiliary/admin/zend/java_bridge.rb b/modules/auxiliary/admin/zend/java_bridge.rb index 92ffde6302..920c4d1f88 100644 --- a/modules/auxiliary/admin/zend/java_bridge.rb +++ b/modules/auxiliary/admin/zend/java_bridge.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'ikki', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '71420'], diff --git a/modules/auxiliary/analyze/jtr_aix.rb b/modules/auxiliary/analyze/jtr_aix.rb index 326cb61f32..1f172392f9 100644 --- a/modules/auxiliary/analyze/jtr_aix.rb +++ b/modules/auxiliary/analyze/jtr_aix.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'John the Ripper AIX Password Cracker', - 'Version' => '$Revision$', 'Description' => %Q{ This module uses John the Ripper to identify weak passwords that have been acquired from passwd files on AIX systems. diff --git a/modules/auxiliary/analyze/jtr_crack_fast.rb b/modules/auxiliary/analyze/jtr_crack_fast.rb index adc2d86e4f..e0395f84d9 100644 --- a/modules/auxiliary/analyze/jtr_crack_fast.rb +++ b/modules/auxiliary/analyze/jtr_crack_fast.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'John the Ripper Password Cracker (Fast Mode)', - 'Version' => '$Revision$', 'Description' => %Q{ This module uses John the Ripper to identify weak passwords that have been acquired as hashed files (loot) or raw LANMAN/NTLM hashes (hashdump). The goal diff --git a/modules/auxiliary/analyze/jtr_linux.rb b/modules/auxiliary/analyze/jtr_linux.rb index fab5b42940..6f724bcd85 100644 --- a/modules/auxiliary/analyze/jtr_linux.rb +++ b/modules/auxiliary/analyze/jtr_linux.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'John the Ripper Linux Password Cracker', - 'Version' => '$Revision$', 'Description' => %Q{ This module uses John the Ripper to identify weak passwords that have been acquired from unshadowed passwd files from Unix systems. The module will only crack diff --git a/modules/auxiliary/analyze/jtr_mssql_fast.rb b/modules/auxiliary/analyze/jtr_mssql_fast.rb index 556fc7ab93..233b4efe17 100644 --- a/modules/auxiliary/analyze/jtr_mssql_fast.rb +++ b/modules/auxiliary/analyze/jtr_mssql_fast.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'John the Ripper MS SQL Password Cracker (Fast Mode)', - 'Version' => "$Revision$", 'Description' => %Q{ This module uses John the Ripper to identify weak passwords that have been acquired from the mssql_hashdump module. Passwords that have been successfully diff --git a/modules/auxiliary/analyze/jtr_mysql_fast.rb b/modules/auxiliary/analyze/jtr_mysql_fast.rb index ab8a187178..ceba750a5b 100644 --- a/modules/auxiliary/analyze/jtr_mysql_fast.rb +++ b/modules/auxiliary/analyze/jtr_mysql_fast.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'John the Ripper MySQL Password Cracker (Fast Mode)', - 'Version' => '$Revision$', 'Description' => %Q{ This module uses John the Ripper to identify weak passwords that have been acquired from the mysql_hashdump module. Passwords that have been successfully diff --git a/modules/auxiliary/analyze/jtr_oracle_fast.rb b/modules/auxiliary/analyze/jtr_oracle_fast.rb index 3a9209ba81..683dd9a62d 100644 --- a/modules/auxiliary/analyze/jtr_oracle_fast.rb +++ b/modules/auxiliary/analyze/jtr_oracle_fast.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'John the Ripper Oracle Password Cracker (Fast Mode)', - 'Version' => "$Revision$", 'Description' => %Q{ This module uses John the Ripper to identify weak passwords that have been acquired from the oracle_hashdump module. Passwords that have been successfully diff --git a/modules/auxiliary/analyze/jtr_unshadow.rb b/modules/auxiliary/analyze/jtr_unshadow.rb index d786d3f984..f3f317eadf 100644 --- a/modules/auxiliary/analyze/jtr_unshadow.rb +++ b/modules/auxiliary/analyze/jtr_unshadow.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Unix Unshadow Utility', - 'Version' => "$Revision$", 'Description' => %Q{ This module takes a passwd and shadow file and 'unshadows' them and saves them as linux.hashes loot. diff --git a/modules/auxiliary/analyze/postgres_md5_crack.rb b/modules/auxiliary/analyze/postgres_md5_crack.rb index fb1dd924c6..2e6d33f74f 100644 --- a/modules/auxiliary/analyze/postgres_md5_crack.rb +++ b/modules/auxiliary/analyze/postgres_md5_crack.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Postgres SQL md5 Password Cracker', - 'Version' => '$Revision$', 'Description' => %Q{ This module attempts to crack Postgres SQL md5 password hashes. It creates hashes based on information saved in the MSF Database diff --git a/modules/auxiliary/bnat/bnat_router.rb b/modules/auxiliary/bnat/bnat_router.rb index 49495bf1fd..5c18619acf 100644 --- a/modules/auxiliary/bnat/bnat_router.rb +++ b/modules/auxiliary/bnat/bnat_router.rb @@ -1,7 +1,3 @@ -### -# $Id$ -### - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -16,7 +12,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'BNAT Router', - 'Version' => '$Revision$', 'Description' => %q{ This module will properly route BNAT traffic and allow for connections to be established to machines on ports which might not otherwise be accessible.}, diff --git a/modules/auxiliary/bnat/bnat_scan.rb b/modules/auxiliary/bnat/bnat_scan.rb index eaaff4e2a6..b659524639 100644 --- a/modules/auxiliary/bnat/bnat_scan.rb +++ b/modules/auxiliary/bnat/bnat_scan.rb @@ -1,7 +1,3 @@ -### -# $Id$ -### - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -18,7 +14,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'BNAT Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module is a scanner which can detect Broken NAT (network address translation) implementations, which could result in a inability to reach ports on remote diff --git a/modules/auxiliary/client/smtp/emailer.rb b/modules/auxiliary/client/smtp/emailer.rb index f8180e546d..34b17c2937 100644 --- a/modules/auxiliary/client/smtp/emailer.rb +++ b/modules/auxiliary/client/smtp/emailer.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary engineering. }, 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://spl0it.org/' ], diff --git a/modules/auxiliary/crawler/msfcrawler.rb b/modules/auxiliary/crawler/msfcrawler.rb index 0a109ae700..5d9af9fc57 100644 --- a/modules/auxiliary/crawler/msfcrawler.rb +++ b/modules/auxiliary/crawler/msfcrawler.rb @@ -1,7 +1,5 @@ #!/usr/bin/env ruby # -# $Id$ -# # Web Crawler. # # Author: Efrain Torres et [at] metasploit.com 2010 @@ -24,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'Metasploit Web Crawler', - 'Version' => '$Revision$', 'Description' => 'This auxiliary module is a modular web crawler, to be used in conjuntion with wmap (someday) or standalone.', 'Author' => 'et', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb index 69ae191564..0cd7018408 100644 --- a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb +++ b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Patrick Webster ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '1154'], diff --git a/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb b/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb index c1645d52e9..2c9f2a6e3a 100644 --- a/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb +++ b/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary 'theLightCosine' # msf module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2156' ], diff --git a/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb b/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb index 5953a2c72e..7773413212 100644 --- a/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb +++ b/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://lists.immunitysec.com/pipermail/dailydave/2006-February/002982.html' ], diff --git a/modules/auxiliary/dos/hp/data_protector_rds.rb b/modules/auxiliary/dos/hp/data_protector_rds.rb index f4f9ec8c43..1bfed3692f 100644 --- a/modules/auxiliary/dos/hp/data_protector_rds.rb +++ b/modules/auxiliary/dos/hp/data_protector_rds.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary 'sinn3r', #msf ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-0514' ], diff --git a/modules/auxiliary/dos/http/3com_superstack_switch.rb b/modules/auxiliary/dos/http/3com_superstack_switch.rb index f9d95c1827..52706a9880 100644 --- a/modules/auxiliary/dos/http/3com_superstack_switch.rb +++ b/modules/auxiliary/dos/http/3com_superstack_switch.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ # patrickw - I am not sure if these are correct, but the closest match! diff --git a/modules/auxiliary/dos/http/apache_mod_isapi.rb b/modules/auxiliary/dos/http/apache_mod_isapi.rb index c60138353b..04ef0fa8f7 100644 --- a/modules/auxiliary/dos/http/apache_mod_isapi.rb +++ b/modules/auxiliary/dos/http/apache_mod_isapi.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -43,7 +39,6 @@ class Metasploit3 < Msf::Auxiliary 'Brett Gervasoni', # original discovery 'jduck' ], - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'References' => [ diff --git a/modules/auxiliary/dos/http/apache_range_dos.rb b/modules/auxiliary/dos/http/apache_range_dos.rb index 41f75be28a..1cab306c3e 100644 --- a/modules/auxiliary/dos/http/apache_range_dos.rb +++ b/modules/auxiliary/dos/http/apache_range_dos.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary 'Masashi Fujiwara' #metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '49303'], diff --git a/modules/auxiliary/dos/http/apache_tomcat_transfer_encoding.rb b/modules/auxiliary/dos/http/apache_tomcat_transfer_encoding.rb index 02e1c7cc9b..8d549514a7 100644 --- a/modules/auxiliary/dos/http/apache_tomcat_transfer_encoding.rb +++ b/modules/auxiliary/dos/http/apache_tomcat_transfer_encoding.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary 'Paulino Calderon ', #metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2227' ], diff --git a/modules/auxiliary/dos/http/dell_openmanage_post.rb b/modules/auxiliary/dos/http/dell_openmanage_post.rb index bebba2d291..ccb871e447 100644 --- a/modules/auxiliary/dos/http/dell_openmanage_post.rb +++ b/modules/auxiliary/dos/http/dell_openmanage_post.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-02/0650.html' ], diff --git a/modules/auxiliary/dos/http/hashcollision_dos.rb b/modules/auxiliary/dos/http/hashcollision_dos.rb index bccf0704c9..d92c36f73b 100644 --- a/modules/auxiliary/dos/http/hashcollision_dos.rb +++ b/modules/auxiliary/dos/http/hashcollision_dos.rb @@ -36,7 +36,6 @@ class Metasploit3 < Msf::Auxiliary 'Christian Mehlmauer ' # metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://www.ocert.org/advisories/ocert-2011-003.html'], diff --git a/modules/auxiliary/dos/http/sonicwall_ssl_format.rb b/modules/auxiliary/dos/http/sonicwall_ssl_format.rb index 7cbe47c42a..a18b172987 100644 --- a/modules/auxiliary/dos/http/sonicwall_ssl_format.rb +++ b/modules/auxiliary/dos/http/sonicwall_ssl_format.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '35145' ], #[ 'CVE', '' ], # no CVE? diff --git a/modules/auxiliary/dos/http/webrick_regex.rb b/modules/auxiliary/dos/http/webrick_regex.rb index bbd0cd3fc8..34f83072e2 100644 --- a/modules/auxiliary/dos/http/webrick_regex.rb +++ b/modules/auxiliary/dos/http/webrick_regex.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '30644'], [ 'CVE', '2008-3656'], diff --git a/modules/auxiliary/dos/mdns/avahi_portzero.rb b/modules/auxiliary/dos/mdns/avahi_portzero.rb index 6c3ad96ca0..ec0d44cce2 100644 --- a/modules/auxiliary/dos/mdns/avahi_portzero.rb +++ b/modules/auxiliary/dos/mdns/avahi_portzero.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5081' ], [ 'OSVDB', '50929' ], diff --git a/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb b/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb index a15751b505..fc606c9845 100644 --- a/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb +++ b/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'todb' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '37255' ], diff --git a/modules/auxiliary/dos/pptp/ms02_063_pptp_dos.rb b/modules/auxiliary/dos/pptp/ms02_063_pptp_dos.rb index c45bc2aa67..d50494af30 100644 --- a/modules/auxiliary/dos/pptp/ms02_063_pptp_dos.rb +++ b/modules/auxiliary/dos/pptp/ms02_063_pptp_dos.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '5807' ], diff --git a/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb b/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb index da40a73201..0bc8a9cedd 100644 --- a/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb +++ b/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2446'], diff --git a/modules/auxiliary/dos/samba/lsa_transnames_heap.rb b/modules/auxiliary/dos/samba/lsa_transnames_heap.rb index 6c6419d06b..ab69b99576 100644 --- a/modules/auxiliary/dos/samba/lsa_transnames_heap.rb +++ b/modules/auxiliary/dos/samba/lsa_transnames_heap.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-2446'], diff --git a/modules/auxiliary/dos/scada/beckhoff_twincat.rb b/modules/auxiliary/dos/scada/beckhoff_twincat.rb index 66ac112ce2..787f7a6140 100644 --- a/modules/auxiliary/dos/scada/beckhoff_twincat.rb +++ b/modules/auxiliary/dos/scada/beckhoff_twincat.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary 'jfa', # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-3486' ], diff --git a/modules/auxiliary/dos/scada/d20_tftp_overflow.rb b/modules/auxiliary/dos/scada/d20_tftp_overflow.rb index 99a01258a8..381a4dda6f 100644 --- a/modules/auxiliary/dos/scada/d20_tftp_overflow.rb +++ b/modules/auxiliary/dos/scada/d20_tftp_overflow.rb @@ -43,7 +43,6 @@ class Metasploit3 < Msf::Auxiliary [ [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] ], - 'Version' => '$Revision$', 'DisclosureDate' => 'Jan 19 2012' )) diff --git a/modules/auxiliary/dos/smtp/sendmail_prescan.rb b/modules/auxiliary/dos/smtp/sendmail_prescan.rb index 8e7407779d..f0eddba31c 100644 --- a/modules/auxiliary/dos/smtp/sendmail_prescan.rb +++ b/modules/auxiliary/dos/smtp/sendmail_prescan.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary bytes can be used, limiting the likelihood for arbitrary code execution. }, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '2577' ], diff --git a/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb b/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb index 64d689a126..e03ac458d7 100644 --- a/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb +++ b/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm', 'Optyx ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-4797' ], diff --git a/modules/auxiliary/dos/ssl/dtls_changecipherspec.rb b/modules/auxiliary/dos/ssl/dtls_changecipherspec.rb index 65cfc1d43d..58df110d2b 100644 --- a/modules/auxiliary/dos/ssl/dtls_changecipherspec.rb +++ b/modules/auxiliary/dos/ssl/dtls_changecipherspec.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary 'theLightCosine' # metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-1386' ], diff --git a/modules/auxiliary/dos/syslog/rsyslog_long_tag.rb b/modules/auxiliary/dos/syslog/rsyslog_long_tag.rb index 41dedf777d..b3aad945a1 100644 --- a/modules/auxiliary/dos/syslog/rsyslog_long_tag.rb +++ b/modules/auxiliary/dos/syslog/rsyslog_long_tag.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'hdm', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-3200'], diff --git a/modules/auxiliary/dos/tcp/junos_tcp_opt.rb b/modules/auxiliary/dos/tcp/junos_tcp_opt.rb index 957b1d76e4..8d7291337c 100644 --- a/modules/auxiliary/dos/tcp/junos_tcp_opt.rb +++ b/modules/auxiliary/dos/tcp/junos_tcp_opt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -34,8 +30,7 @@ class Metasploit3 < Msf::Auxiliary ['BID', '37670'], ['OSVDB', '61538'], ['URL','http://praetorianprefect.com/archives/2010/01/junos-juniper-flaw-exposes-core-routers-to-kernal-crash/'] - ], - 'Version' => '$Revision$' # 02/02/2010 + ] ) register_options([ diff --git a/modules/auxiliary/dos/tcp/synflood.rb b/modules/auxiliary/dos/tcp/synflood.rb index 66594d6bcc..66b5a47282 100644 --- a/modules/auxiliary/dos/tcp/synflood.rb +++ b/modules/auxiliary/dos/tcp/synflood.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,8 +17,7 @@ class Metasploit3 < Msf::Auxiliary 'Name' => 'TCP SYN Flooder', 'Description' => 'A simple TCP SYN flooder', 'Author' => 'kris katterjohn', - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' # 03/13/2009 + 'License' => MSF_LICENSE ) register_options([ diff --git a/modules/auxiliary/dos/wifi/apple_orinoco_probe_response.rb b/modules/auxiliary/dos/wifi/apple_orinoco_probe_response.rb index 2cf0c4313f..67a5ae6ee1 100644 --- a/modules/auxiliary/dos/wifi/apple_orinoco_probe_response.rb +++ b/modules/auxiliary/dos/wifi/apple_orinoco_probe_response.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -37,8 +33,7 @@ class Metasploit3 < Msf::Auxiliary [ ['CVE', '2006-5710'], ['OSVDB', '30180'], - ], - 'Version' => '$Revision$' + ] )) register_options( [ diff --git a/modules/auxiliary/dos/wifi/cts_rts_flood.rb b/modules/auxiliary/dos/wifi/cts_rts_flood.rb index 6c058fb8c4..259c8cee7b 100644 --- a/modules/auxiliary/dos/wifi/cts_rts_flood.rb +++ b/modules/auxiliary/dos/wifi/cts_rts_flood.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary using the specified source address, }, 'Author' => [ 'Brad Antoniewicz' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( diff --git a/modules/auxiliary/dos/wifi/deauth.rb b/modules/auxiliary/dos/wifi/deauth.rb index 283fb2f78c..e8eff6f2c6 100644 --- a/modules/auxiliary/dos/wifi/deauth.rb +++ b/modules/auxiliary/dos/wifi/deauth.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Brad Antoniewicz' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( diff --git a/modules/auxiliary/dos/wifi/fakeap.rb b/modules/auxiliary/dos/wifi/fakeap.rb index 9658cbdd1d..11cc5780a7 100644 --- a/modules/auxiliary/dos/wifi/fakeap.rb +++ b/modules/auxiliary/dos/wifi/fakeap.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm', 'kris katterjohn' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ diff --git a/modules/auxiliary/dos/wifi/file2air.rb b/modules/auxiliary/dos/wifi/file2air.rb index aa2bdd1008..d37be665ea 100644 --- a/modules/auxiliary/dos/wifi/file2air.rb +++ b/modules/auxiliary/dos/wifi/file2air.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary }, # 11/03/2008 'Author' => 'kris katterjohn', - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ diff --git a/modules/auxiliary/dos/wifi/netgear_ma521_rates.rb b/modules/auxiliary/dos/wifi/netgear_ma521_rates.rb index 1deaf5eecc..73dea9fbe5 100644 --- a/modules/auxiliary/dos/wifi/netgear_ma521_rates.rb +++ b/modules/auxiliary/dos/wifi/netgear_ma521_rates.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -34,7 +30,6 @@ class Metasploit3 < Msf::Auxiliary (external/ruby-lorcon/README) for more information. }, 'Author' => [ 'Laurent Butti <0x9090 [at] gmail.com>' ], # initial discovery and metasploit module - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'References' => [ diff --git a/modules/auxiliary/dos/wifi/netgear_wg311pci.rb b/modules/auxiliary/dos/wifi/netgear_wg311pci.rb index a4c3028e9f..c46e0aee08 100644 --- a/modules/auxiliary/dos/wifi/netgear_wg311pci.rb +++ b/modules/auxiliary/dos/wifi/netgear_wg311pci.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary (external/ruby-lorcon/README) for more information. }, 'Author' => [ 'Laurent Butti <0x9090 [at] gmail.com>' ], # initial discovery and metasploit module - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'References' => [ diff --git a/modules/auxiliary/dos/wifi/probe_resp_null_ssid.rb b/modules/auxiliary/dos/wifi/probe_resp_null_ssid.rb index aadf4ad003..4680e449e0 100644 --- a/modules/auxiliary/dos/wifi/probe_resp_null_ssid.rb +++ b/modules/auxiliary/dos/wifi/probe_resp_null_ssid.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://802.11ninja.net/papers/firmware_attack.pdf'], diff --git a/modules/auxiliary/dos/wifi/ssidlist_beacon.rb b/modules/auxiliary/dos/wifi/ssidlist_beacon.rb index 6d00b6e210..74991ba58b 100644 --- a/modules/auxiliary/dos/wifi/ssidlist_beacon.rb +++ b/modules/auxiliary/dos/wifi/ssidlist_beacon.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -33,8 +29,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'joswr1ght', 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( [ diff --git a/modules/auxiliary/dos/wifi/wifun.rb b/modules/auxiliary/dos/wifi/wifun.rb index 350cef40f5..f0dca7ada4 100644 --- a/modules/auxiliary/dos/wifi/wifun.rb +++ b/modules/auxiliary/dos/wifi/wifun.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/dos/windows/appian/appian_bpm.rb b/modules/auxiliary/dos/windows/appian/appian_bpm.rb index 382f56db4f..80d9656c34 100644 --- a/modules/auxiliary/dos/windows/appian/appian_bpm.rb +++ b/modules/auxiliary/dos/windows/appian/appian_bpm.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'guiness.stout ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2007-6509'], diff --git a/modules/auxiliary/dos/windows/browser/ms09_065_eot_integer.rb b/modules/auxiliary/dos/windows/browser/ms09_065_eot_integer.rb index 035163abec..de82b21fb9 100644 --- a/modules/auxiliary/dos/windows/browser/ms09_065_eot_integer.rb +++ b/modules/auxiliary/dos/windows/browser/ms09_065_eot_integer.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'License' => MSF_LICENSE, 'Author' => 'hdm', - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-2514' ], diff --git a/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb b/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb index 75ba28552e..7c1e44ab82 100644 --- a/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb +++ b/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '15346' ], diff --git a/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb b/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb index f4ffbb1c95..980e67397f 100644 --- a/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb +++ b/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '21542' ], diff --git a/modules/auxiliary/dos/windows/ftp/guildftp_cwdlist.rb b/modules/auxiliary/dos/windows/ftp/guildftp_cwdlist.rb index a22fbf5b85..557d391470 100644 --- a/modules/auxiliary/dos/windows/ftp/guildftp_cwdlist.rb +++ b/modules/auxiliary/dos/windows/ftp/guildftp_cwdlist.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-4572' ], diff --git a/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb b/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb index 0a76c4ad62..4b88ce4fbf 100644 --- a/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb +++ b/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -33,7 +29,6 @@ class Metasploit3 < Msf::Auxiliary 'jduck' # Metasploit module ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-3972' ], diff --git a/modules/auxiliary/dos/windows/ftp/solarftp_user.rb b/modules/auxiliary/dos/windows/ftp/solarftp_user.rb index 7e4f8f1b6f..88be5f2f0f 100644 --- a/modules/auxiliary/dos/windows/ftp/solarftp_user.rb +++ b/modules/auxiliary/dos/windows/ftp/solarftp_user.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary 'sinn3r', #Metasploit edit/commit ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'EDB', '16204' ], diff --git a/modules/auxiliary/dos/windows/ftp/titan626_site.rb b/modules/auxiliary/dos/windows/ftp/titan626_site.rb index 76f363880f..62388c5d55 100644 --- a/modules/auxiliary/dos/windows/ftp/titan626_site.rb +++ b/modules/auxiliary/dos/windows/ftp/titan626_site.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-6082'], diff --git a/modules/auxiliary/dos/windows/ftp/vicftps50_list.rb b/modules/auxiliary/dos/windows/ftp/vicftps50_list.rb index 0df99d2953..890ad99235 100644 --- a/modules/auxiliary/dos/windows/ftp/vicftps50_list.rb +++ b/modules/auxiliary/dos/windows/ftp/vicftps50_list.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-2031' ], diff --git a/modules/auxiliary/dos/windows/ftp/winftp230_nlst.rb b/modules/auxiliary/dos/windows/ftp/winftp230_nlst.rb index 9c3eca5167..5c566c34e7 100644 --- a/modules/auxiliary/dos/windows/ftp/winftp230_nlst.rb +++ b/modules/auxiliary/dos/windows/ftp/winftp230_nlst.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5666' ], diff --git a/modules/auxiliary/dos/windows/ftp/xmeasy560_nlst.rb b/modules/auxiliary/dos/windows/ftp/xmeasy560_nlst.rb index e9b97b3d84..e21cc652d2 100644 --- a/modules/auxiliary/dos/windows/ftp/xmeasy560_nlst.rb +++ b/modules/auxiliary/dos/windows/ftp/xmeasy560_nlst.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5626'], diff --git a/modules/auxiliary/dos/windows/ftp/xmeasy570_nlst.rb b/modules/auxiliary/dos/windows/ftp/xmeasy570_nlst.rb index 446e5de70f..ae96c119ae 100644 --- a/modules/auxiliary/dos/windows/ftp/xmeasy570_nlst.rb +++ b/modules/auxiliary/dos/windows/ftp/xmeasy570_nlst.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-5626'], [ 'OSVDB', '50837'], diff --git a/modules/auxiliary/dos/windows/games/kaillera.rb b/modules/auxiliary/dos/windows/games/kaillera.rb index 085ba760f8..2f12569f74 100644 --- a/modules/auxiliary/dos/windows/games/kaillera.rb +++ b/modules/auxiliary/dos/windows/games/kaillera.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => ["Sil3nt_Dre4m"], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://kaillerahacks.blogspot.com/2011/07/kaillera-server-086-dos-vulnerability.html' ] diff --git a/modules/auxiliary/dos/windows/http/ms10_065_ii6_asp_dos.rb b/modules/auxiliary/dos/windows/http/ms10_065_ii6_asp_dos.rb index 0c169539fb..490ef0cced 100644 --- a/modules/auxiliary/dos/windows/http/ms10_065_ii6_asp_dos.rb +++ b/modules/auxiliary/dos/windows/http/ms10_065_ii6_asp_dos.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary 'Leandro Oliveira ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-1899' ], diff --git a/modules/auxiliary/dos/windows/http/pi3web_isapi.rb b/modules/auxiliary/dos/windows/http/pi3web_isapi.rb index c276f5a10d..5096c211ef 100644 --- a/modules/auxiliary/dos/windows/http/pi3web_isapi.rb +++ b/modules/auxiliary/dos/windows/http/pi3web_isapi.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-6938'], [ 'OSVDB', '49998'], diff --git a/modules/auxiliary/dos/windows/llmnr/ms11_030_dnsapi.rb b/modules/auxiliary/dos/windows/llmnr/ms11_030_dnsapi.rb index cc4664d164..feece39a11 100644 --- a/modules/auxiliary/dos/windows/llmnr/ms11_030_dnsapi.rb +++ b/modules/auxiliary/dos/windows/llmnr/ms11_030_dnsapi.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -33,7 +29,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'jduck', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-0657' ], diff --git a/modules/auxiliary/dos/windows/nat/nat_helper.rb b/modules/auxiliary/dos/windows/nat/nat_helper.rb index c67f0845dc..8cf3c34453 100644 --- a/modules/auxiliary/dos/windows/nat/nat_helper.rb +++ b/modules/auxiliary/dos/windows/nat/nat_helper.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '30096'], diff --git a/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb b/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb index 7b50574cec..46082ee749 100644 --- a/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb +++ b/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2005-2120' ], diff --git a/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb b/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb index 714a9eb4af..98d416652d 100644 --- a/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb +++ b/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['BID', '19215'], diff --git a/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb b/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb index b689c8ef69..206df1f4fc 100644 --- a/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb +++ b/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '27644' ], diff --git a/modules/auxiliary/dos/windows/smb/ms09_001_write.rb b/modules/auxiliary/dos/windows/smb/ms09_001_write.rb index 35fba87753..2bcb0c0a5f 100644 --- a/modules/auxiliary/dos/windows/smb/ms09_001_write.rb +++ b/modules/auxiliary/dos/windows/smb/ms09_001_write.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'j.v.vallejo[at]gmail.com' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['MSB', 'MS09-001'], diff --git a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb index 117af06ff4..3d547e0a7d 100644 --- a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb +++ b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'Laurent Gaffie ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '2009-3103'], diff --git a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb index 0d488b31bf..fac7e2713e 100644 --- a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb +++ b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'sf' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-3103'], diff --git a/modules/auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop.rb b/modules/auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop.rb index c9766b1274..8bfc1d9a27 100644 --- a/modules/auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop.rb +++ b/modules/auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop.rb @@ -1,8 +1,4 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -34,8 +30,7 @@ class Metasploit3 < Msf::Auxiliary ['URL', 'http://g-laurent.blogspot.com/2009/11/windows-7-server-2008r2-remote-kernel.html'] ], 'Author' => [ 'Laurent Gaffie ', 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ diff --git a/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb b/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb index a60fe801ca..add4fb4e1b 100644 --- a/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb +++ b/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -33,8 +29,7 @@ class Metasploit3 < Msf::Auxiliary ['URL', 'http://seclists.org/fulldisclosure/2010/Aug/122'] ], 'Author' => [ 'Laurent Gaffie ', 'jduck' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( diff --git a/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb b/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb index a898ac500d..fb0a544949 100644 --- a/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb +++ b/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -47,8 +43,7 @@ class Metasploit3 < Msf::Auxiliary [ 'URL', 'http://seclists.org/fulldisclosure/2011/Feb/285' ] ], 'Author' => [ 'Cupidon-3005', 'jduck' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( diff --git a/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb b/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb index 7098c5d53d..dcce89b116 100644 --- a/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb +++ b/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64340'], diff --git a/modules/auxiliary/dos/windows/smb/vista_negotiate_stop.rb b/modules/auxiliary/dos/windows/smb/vista_negotiate_stop.rb index 018c76d024..38c7bf54ff 100644 --- a/modules/auxiliary/dos/windows/smb/vista_negotiate_stop.rb +++ b/modules/auxiliary/dos/windows/smb/vista_negotiate_stop.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '64341'], diff --git a/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb b/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb index e06089e4e3..618653e912 100644 --- a/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb +++ b/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'pusscat' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '17908'], diff --git a/modules/auxiliary/dos/windows/tftp/pt360_write.rb b/modules/auxiliary/dos/windows/tftp/pt360_write.rb index f54a55de71..b6c8effd87 100644 --- a/modules/auxiliary/dos/windows/tftp/pt360_write.rb +++ b/modules/auxiliary/dos/windows/tftp/pt360_write.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1311'], diff --git a/modules/auxiliary/dos/windows/tftp/solarwinds.rb b/modules/auxiliary/dos/windows/tftp/solarwinds.rb index 3376889a86..3ada21a895 100644 --- a/modules/auxiliary/dos/windows/tftp/solarwinds.rb +++ b/modules/auxiliary/dos/windows/tftp/solarwinds.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'Nullthreat', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2115' ], diff --git a/modules/auxiliary/dos/wireshark/chunked.rb b/modules/auxiliary/dos/wireshark/chunked.rb index 8bb395547c..568d3d0403 100644 --- a/modules/auxiliary/dos/wireshark/chunked.rb +++ b/modules/auxiliary/dos/wireshark/chunked.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Matteo Cantoni ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-3389'], diff --git a/modules/auxiliary/dos/wireshark/cldap.rb b/modules/auxiliary/dos/wireshark/cldap.rb index ee8b2b91a0..ce5e2c691d 100644 --- a/modules/auxiliary/dos/wireshark/cldap.rb +++ b/modules/auxiliary/dos/wireshark/cldap.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => ['joernchen (Phenoelit)'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2011-1140'], diff --git a/modules/auxiliary/dos/wireshark/ldap.rb b/modules/auxiliary/dos/wireshark/ldap.rb index 85c138d594..bd79aa3099 100644 --- a/modules/auxiliary/dos/wireshark/ldap.rb +++ b/modules/auxiliary/dos/wireshark/ldap.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => ['MC'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1562' ], diff --git a/modules/auxiliary/fuzzers/ftp/client_ftp.rb b/modules/auxiliary/fuzzers/ftp/client_ftp.rb index 00ca0eeb90..e202281f9e 100644 --- a/modules/auxiliary/fuzzers/ftp/client_ftp.rb +++ b/modules/auxiliary/fuzzers/ftp/client_ftp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'corelanc0d3r ' ], 'License' => MSF_LICENSE, - 'Version' => "$Revision$", 'References' => [ [ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ], diff --git a/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb b/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb index df27a76719..3e66dc05e0 100644 --- a/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb +++ b/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb @@ -1,6 +1,3 @@ -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -8,7 +5,6 @@ # http://metasploit.com/ ## - require 'msf/core' class Metasploit3 < Msf::Auxiliary @@ -23,8 +19,7 @@ class Metasploit3 < Msf::Auxiliary This module will connect to a FTP server and perform pre- and post-authentication fuzzing }, 'Author' => [ 'corelanc0d3r ', 'jduck' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE ) register_options( diff --git a/modules/auxiliary/fuzzers/http/http_form_field.rb b/modules/auxiliary/fuzzers/http/http_form_field.rb index 5b6e2e2c1f..2666425f3e 100644 --- a/modules/auxiliary/fuzzers/http/http_form_field.rb +++ b/modules/auxiliary/fuzzers/http/http_form_field.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -35,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary 'Paulino Calderon ' #Added cookie handling ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL','http://www.corelan.be:8800/index.php/2010/11/12/metasploit-module-http-form-field-fuzzer'], diff --git a/modules/auxiliary/fuzzers/http/http_get_uri_long.rb b/modules/auxiliary/fuzzers/http/http_get_uri_long.rb index 8b563acdb3..0c8f0c7333 100644 --- a/modules/auxiliary/fuzzers/http/http_get_uri_long.rb +++ b/modules/auxiliary/fuzzers/http/http_get_uri_long.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of HTTP GET request with incrementing URL lengths. }, 'Author' => [ 'nullthreat' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(80), diff --git a/modules/auxiliary/fuzzers/http/http_get_uri_strings.rb b/modules/auxiliary/fuzzers/http/http_get_uri_strings.rb index c975c7ccb1..706a4c95ba 100644 --- a/modules/auxiliary/fuzzers/http/http_get_uri_strings.rb +++ b/modules/auxiliary/fuzzers/http/http_get_uri_strings.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of HTTP GET request with malicious URIs. }, 'Author' => [ 'nullthreat' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(80), diff --git a/modules/auxiliary/fuzzers/smb/smb2_negotiate_corrupt.rb b/modules/auxiliary/fuzzers/smb/smb2_negotiate_corrupt.rb index c52a775d3a..daea66fac2 100644 --- a/modules/auxiliary/fuzzers/smb/smb2_negotiate_corrupt.rb +++ b/modules/auxiliary/fuzzers/smb/smb2_negotiate_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary SMB2 dialect with corrupted bytes. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(445), diff --git a/modules/auxiliary/fuzzers/smb/smb_create_pipe.rb b/modules/auxiliary/fuzzers/smb/smb_create_pipe.rb index 841e8d5062..011437f55a 100644 --- a/modules/auxiliary/fuzzers/smb/smb_create_pipe.rb +++ b/modules/auxiliary/fuzzers/smb/smb_create_pipe.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary requests using malicious strings. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/fuzzers/smb/smb_create_pipe_corrupt.rb b/modules/auxiliary/fuzzers/smb/smb_create_pipe_corrupt.rb index 92ba4f7259..3a7f406bc0 100644 --- a/modules/auxiliary/fuzzers/smb/smb_create_pipe_corrupt.rb +++ b/modules/auxiliary/fuzzers/smb/smb_create_pipe_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of SMB create pipe requests with corrupted bytes. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ OptInt.new('MAXDEPTH', [false, 'Specify a maximum byte depth to test']), diff --git a/modules/auxiliary/fuzzers/smb/smb_negotiate_corrupt.rb b/modules/auxiliary/fuzzers/smb/smb_negotiate_corrupt.rb index c427c69871..b4f488dc49 100644 --- a/modules/auxiliary/fuzzers/smb/smb_negotiate_corrupt.rb +++ b/modules/auxiliary/fuzzers/smb/smb_negotiate_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of SMB negiotiate requests with corrupted bytes }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(445), diff --git a/modules/auxiliary/fuzzers/smb/smb_ntlm1_login_corrupt.rb b/modules/auxiliary/fuzzers/smb/smb_ntlm1_login_corrupt.rb index 4610d4ed83..1497b8b211 100644 --- a/modules/auxiliary/fuzzers/smb/smb_ntlm1_login_corrupt.rb +++ b/modules/auxiliary/fuzzers/smb/smb_ntlm1_login_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary the NTLMv1 protocol with corrupted bytes. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(445), diff --git a/modules/auxiliary/fuzzers/smb/smb_tree_connect.rb b/modules/auxiliary/fuzzers/smb/smb_tree_connect.rb index 1ab8eef29e..69cf68e858 100644 --- a/modules/auxiliary/fuzzers/smb/smb_tree_connect.rb +++ b/modules/auxiliary/fuzzers/smb/smb_tree_connect.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary requests using malicious strings. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/fuzzers/smb/smb_tree_connect_corrupt.rb b/modules/auxiliary/fuzzers/smb/smb_tree_connect_corrupt.rb index b61b672b72..0b6417ecde 100644 --- a/modules/auxiliary/fuzzers/smb/smb_tree_connect_corrupt.rb +++ b/modules/auxiliary/fuzzers/smb/smb_tree_connect_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of SMB tree connect requests with corrupted bytes. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ OptInt.new('MAXDEPTH', [false, 'Specify a maximum byte depth to test']), diff --git a/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb b/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb index 24e8b7b396..b76258cf25 100644 --- a/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb +++ b/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # A Very simple Module to fuzzer some SMTP commands. # It allows to respect the order or just throw everything at it.... @@ -18,7 +14,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMTP Simple Fuzzer', - 'Version' => '$Revision$', 'Description' => 'SMTP Simple Fuzzer', 'References' => [ diff --git a/modules/auxiliary/fuzzers/ssh/ssh_kexinit_corrupt.rb b/modules/auxiliary/fuzzers/ssh/ssh_kexinit_corrupt.rb index 22c1ea02e7..410109b2a5 100644 --- a/modules/auxiliary/fuzzers/ssh/ssh_kexinit_corrupt.rb +++ b/modules/auxiliary/fuzzers/ssh/ssh_kexinit_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of SSH requests with a corrupted initial key exchange payload. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(22), diff --git a/modules/auxiliary/fuzzers/ssh/ssh_version_15.rb b/modules/auxiliary/fuzzers/ssh/ssh_version_15.rb index 99f16bf75f..1c60e67a81 100644 --- a/modules/auxiliary/fuzzers/ssh/ssh_version_15.rb +++ b/modules/auxiliary/fuzzers/ssh/ssh_version_15.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of SSH requests with malicious version strings. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(22) diff --git a/modules/auxiliary/fuzzers/ssh/ssh_version_2.rb b/modules/auxiliary/fuzzers/ssh/ssh_version_2.rb index bee21d2c91..6a4e1182c8 100644 --- a/modules/auxiliary/fuzzers/ssh/ssh_version_2.rb +++ b/modules/auxiliary/fuzzers/ssh/ssh_version_2.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of SSH requests with malicious version strings. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(22) diff --git a/modules/auxiliary/fuzzers/ssh/ssh_version_corrupt.rb b/modules/auxiliary/fuzzers/ssh/ssh_version_corrupt.rb index 3d77f01b5f..a7fb440eed 100644 --- a/modules/auxiliary/fuzzers/ssh/ssh_version_corrupt.rb +++ b/modules/auxiliary/fuzzers/ssh/ssh_version_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of SSH requests with a corrupted version string }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options([ Opt::RPORT(22), diff --git a/modules/auxiliary/fuzzers/tds/tds_login_corrupt.rb b/modules/auxiliary/fuzzers/tds/tds_login_corrupt.rb index 57bb4a3707..6363a02233 100644 --- a/modules/auxiliary/fuzzers/tds/tds_login_corrupt.rb +++ b/modules/auxiliary/fuzzers/tds/tds_login_corrupt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of malformed TDS login requests. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/fuzzers/tds/tds_login_username.rb b/modules/auxiliary/fuzzers/tds/tds_login_username.rb index 14bdc02400..84aaed0623 100644 --- a/modules/auxiliary/fuzzers/tds/tds_login_username.rb +++ b/modules/auxiliary/fuzzers/tds/tds_login_username.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module sends a series of malformed TDS login requests. }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/fuzzers/wifi/fuzz_beacon.rb b/modules/auxiliary/fuzzers/wifi/fuzz_beacon.rb index cb4e8c41ec..a58865133c 100644 --- a/modules/auxiliary/fuzzers/wifi/fuzz_beacon.rb +++ b/modules/auxiliary/fuzzers/wifi/fuzz_beacon.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( [ diff --git a/modules/auxiliary/fuzzers/wifi/fuzz_proberesp.rb b/modules/auxiliary/fuzzers/wifi/fuzz_proberesp.rb index 7e81de3333..c4111158a8 100644 --- a/modules/auxiliary/fuzzers/wifi/fuzz_proberesp.rb +++ b/modules/auxiliary/fuzzers/wifi/fuzz_proberesp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( [ diff --git a/modules/auxiliary/gather/android_htmlfileprovider.rb b/modules/auxiliary/gather/android_htmlfileprovider.rb index e373682bad..6e374cc4f4 100644 --- a/modules/auxiliary/gather/android_htmlfileprovider.rb +++ b/modules/auxiliary/gather/android_htmlfileprovider.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'Android Content Provider File Disclosure', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits a cross-domain issue within the Android web browser to exfiltrate files from a vulnerable device. @@ -29,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary 'Thomas Cannon', # Original discovery, partial disclsoure 'jduck' # Metasploit module ], - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'Actions' => [ diff --git a/modules/auxiliary/gather/citrix_published_applications.rb b/modules/auxiliary/gather/citrix_published_applications.rb index 26a965e622..f2b4785c64 100644 --- a/modules/auxiliary/gather/citrix_published_applications.rb +++ b/modules/auxiliary/gather/citrix_published_applications.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary a published list of applications. }, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.securiteam.com/exploits/5CP0B1F80S.html' ], diff --git a/modules/auxiliary/gather/citrix_published_bruteforce.rb b/modules/auxiliary/gather/citrix_published_bruteforce.rb index 36b7214d63..7017a78c4a 100644 --- a/modules/auxiliary/gather/citrix_published_bruteforce.rb +++ b/modules/auxiliary/gather/citrix_published_bruteforce.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary Metaframe ICA server. }, 'Author' => [ 'patrick' ], - 'Version' => '$Revision$', 'References' => [ [ 'OSVDB', '50617' ], diff --git a/modules/auxiliary/gather/d20pass.rb b/modules/auxiliary/gather/d20pass.rb index 43df04d3d7..5dab9a5166 100644 --- a/modules/auxiliary/gather/d20pass.rb +++ b/modules/auxiliary/gather/d20pass.rb @@ -31,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'K. Reid Wightman ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'DisclosureDate' => 'Jan 19 2012' )) diff --git a/modules/auxiliary/gather/enum_dns.rb b/modules/auxiliary/gather/enum_dns.rb index 2b6afd7346..0071faeb08 100644 --- a/modules/auxiliary/gather/enum_dns.rb +++ b/modules/auxiliary/gather/enum_dns.rb @@ -22,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Carlos Perez ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['CVE', '1999-0532'], diff --git a/modules/auxiliary/gather/search_email_collector.rb b/modules/auxiliary/gather/search_email_collector.rb index 4a7e45e195..30a7082f26 100644 --- a/modules/auxiliary/gather/search_email_collector.rb +++ b/modules/auxiliary/gather/search_email_collector.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,8 +19,7 @@ class Metasploit3 < Msf::Auxiliary valid email addresses for the target domain. }, 'Author' => [ 'Carlos Perez ' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$')) + 'License' => MSF_LICENSE)) register_options( [ diff --git a/modules/auxiliary/pdf/foxit/authbypass.rb b/modules/auxiliary/pdf/foxit/authbypass.rb index 72390fd562..97ed6a9dd3 100644 --- a/modules/auxiliary/pdf/foxit/authbypass.rb +++ b/modules/auxiliary/pdf/foxit/authbypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'License' => MSF_LICENSE, 'Author' => [ 'MC', 'Didier Stevens ', ], - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0836' ], diff --git a/modules/auxiliary/scanner/backdoor/energizer_duo_detect.rb b/modules/auxiliary/scanner/backdoor/energizer_duo_detect.rb index 1bbdea978e..1c0fc8fa30 100644 --- a/modules/auxiliary/scanner/backdoor/energizer_duo_detect.rb +++ b/modules/auxiliary/scanner/backdoor/energizer_duo_detect.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Energizer DUO Trojan Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect instances of the Energizer DUO trojan horse software on port 7777', 'Author' => 'hdm', 'References' => diff --git a/modules/auxiliary/scanner/db2/db2_auth.rb b/modules/auxiliary/scanner/db2/db2_auth.rb index 113317b473..3fce5293b6 100644 --- a/modules/auxiliary/scanner/db2/db2_auth.rb +++ b/modules/auxiliary/scanner/db2/db2_auth.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DB2 Authentication Brute Force Utility', - 'Version' => '$Revision$', 'Description' => %q{This module attempts to authenticate against a DB2 instance using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options.}, diff --git a/modules/auxiliary/scanner/db2/db2_version.rb b/modules/auxiliary/scanner/db2/db2_version.rb index 9fae3e946a..f2689b9183 100644 --- a/modules/auxiliary/scanner/db2/db2_version.rb +++ b/modules/auxiliary/scanner/db2/db2_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DB2 Probe Utility', - 'Version' => '$Revision$', 'Description' => 'This module queries a DB2 instance information.', 'Author' => ['todb'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/db2/discovery.rb b/modules/auxiliary/scanner/db2/discovery.rb index 89483537d1..4a339f3919 100644 --- a/modules/auxiliary/scanner/db2/discovery.rb +++ b/modules/auxiliary/scanner/db2/discovery.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DB2 Discovery Service Detection', - 'Version' => '$Revision$', 'Description' => 'This module simply queries the DB2 discovery service for information.', 'Author' => [ 'MC' ], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/dcerpc/endpoint_mapper.rb b/modules/auxiliary/scanner/dcerpc/endpoint_mapper.rb index 50a47887dd..8d712798aa 100644 --- a/modules/auxiliary/scanner/dcerpc/endpoint_mapper.rb +++ b/modules/auxiliary/scanner/dcerpc/endpoint_mapper.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Endpoint Mapper Service Discovery', - 'Version' => '$Revision$', 'Description' => %q{ This module can be used to obtain information from the Endpoint Mapper service. diff --git a/modules/auxiliary/scanner/dcerpc/hidden.rb b/modules/auxiliary/scanner/dcerpc/hidden.rb index 36e96c4822..848044404a 100644 --- a/modules/auxiliary/scanner/dcerpc/hidden.rb +++ b/modules/auxiliary/scanner/dcerpc/hidden.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Hidden DCERPC Service Discovery', - 'Version' => '$Revision$', 'Description' => %q{ This module will query the endpoint mapper and make a list of all ncacn_tcp RPC services. It will then connect to each of diff --git a/modules/auxiliary/scanner/dcerpc/management.rb b/modules/auxiliary/scanner/dcerpc/management.rb index 5288d190ba..7a2a9706a1 100644 --- a/modules/auxiliary/scanner/dcerpc/management.rb +++ b/modules/auxiliary/scanner/dcerpc/management.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Remote Management Interface Discovery', - 'Version' => '$Revision$', 'Description' => %q{ This module can be used to obtain information from the Remote Management Interface DCERPC service. diff --git a/modules/auxiliary/scanner/dcerpc/tcp_dcerpc_auditor.rb b/modules/auxiliary/scanner/dcerpc/tcp_dcerpc_auditor.rb index 81fff149c1..3f06afc98a 100644 --- a/modules/auxiliary/scanner/dcerpc/tcp_dcerpc_auditor.rb +++ b/modules/auxiliary/scanner/dcerpc/tcp_dcerpc_auditor.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DCERPC TCP Service Auditor', - 'Version' => '$Revision$', 'Description' => 'Determine what DCERPC services are accessible over a TCP port', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/dect/call_scanner.rb b/modules/auxiliary/scanner/dect/call_scanner.rb index ccfee42bd4..7abf63f889 100644 --- a/modules/auxiliary/scanner/dect/call_scanner.rb +++ b/modules/auxiliary/scanner/dect/call_scanner.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -18,7 +14,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DECT Call Scanner', - 'Version' => '$Revision$', 'Description' => 'This module scans for active DECT calls', 'Author' => [ 'DK ' ], 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/dect/station_scanner.rb b/modules/auxiliary/scanner/dect/station_scanner.rb index 1ee1c68acc..c4daf84971 100644 --- a/modules/auxiliary/scanner/dect/station_scanner.rb +++ b/modules/auxiliary/scanner/dect/station_scanner.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -18,7 +14,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DECT Base Station Scanner', - 'Version' => '$Revision$', 'Description' => 'This module scans for DECT base stations', 'Author' => [ 'DK ' ], 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/discovery/arp_sweep.rb b/modules/auxiliary/scanner/discovery/arp_sweep.rb index 73f626da2e..5b1e584ed4 100644 --- a/modules/auxiliary/scanner/discovery/arp_sweep.rb +++ b/modules/auxiliary/scanner/discovery/arp_sweep.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'ARP Sweep Local Network Discovery', - 'Version' => '$Revision$', 'Description' => %q{ Enumerate alive Hosts in local network using ARP requests. }, diff --git a/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb b/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb index bc32a33858..e36abc0759 100644 --- a/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb +++ b/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb @@ -13,7 +13,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'IPv6 Link Local/Node Local Ping Discovery', - 'Version' => '$Revision$', 'Description' => %q{ Send a ICMPv6 ping request to all default multicast addresses, and wait to see who responds. }, diff --git a/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb b/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb index 6af11951a5..d3d3b7fc38 100644 --- a/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb +++ b/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'IPv6 Local Neighbor Discovery', - 'Version' => '$Revision$', 'Description' => %q{ Enumerate local IPv6 hosts which respond to Neighbor Solicitations with a link-local address. Note, that like ARP scanning, this usually cannot be performed beyond the local diff --git a/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb b/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb index 229bc85b38..3f5814e864 100644 --- a/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb +++ b/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - require 'msf/core' class Metasploit3 < Msf::Auxiliary @@ -12,7 +8,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'IPv6 Local Neighbor Discovery Using Router Advertisement', - 'Version' => '$Revision$', 'Description' => %q{ Send a spoofed router advertisement with high priority to force hosts to start the IPv6 address auto-config. Monitor for IPv6 host advertisements, diff --git a/modules/auxiliary/scanner/discovery/udp_probe.rb b/modules/auxiliary/scanner/discovery/udp_probe.rb index 71649a12a2..4984ee4d19 100644 --- a/modules/auxiliary/scanner/discovery/udp_probe.rb +++ b/modules/auxiliary/scanner/discovery/udp_probe.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'UDP Service Prober', - 'Version' => '$Revision$', 'Description' => 'Detect common UDP services using sequential probes', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/discovery/udp_sweep.rb b/modules/auxiliary/scanner/discovery/udp_sweep.rb index 7ac5b1c0c3..8c73f06838 100644 --- a/modules/auxiliary/scanner/discovery/udp_sweep.rb +++ b/modules/auxiliary/scanner/discovery/udp_sweep.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'UDP Service Sweeper', - 'Version' => '$Revision$', 'Description' => 'Detect interesting UDP services', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/emc/alphastor_devicemanager.rb b/modules/auxiliary/scanner/emc/alphastor_devicemanager.rb index 9300392820..7674e267ca 100644 --- a/modules/auxiliary/scanner/emc/alphastor_devicemanager.rb +++ b/modules/auxiliary/scanner/emc/alphastor_devicemanager.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'EMC AlphaStor Device Manager Service', - 'Version' => '$Revision$', 'Description' => 'This module queries the remote host for the EMC Alphastor Device Management Service.', 'Author' => 'MC', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/emc/alphastor_librarymanager.rb b/modules/auxiliary/scanner/emc/alphastor_librarymanager.rb index 3cef16c0aa..c8cf804145 100644 --- a/modules/auxiliary/scanner/emc/alphastor_librarymanager.rb +++ b/modules/auxiliary/scanner/emc/alphastor_librarymanager.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'EMC AlphaStor Library Manager Service', - 'Version' => '$Revision$', 'Description' => 'This module queries the remote host for the EMC Alphastor Library Management Service.', 'Author' => 'MC', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/finger/finger_users.rb b/modules/auxiliary/scanner/finger/finger_users.rb index 2b8047a156..0f959b41de 100644 --- a/modules/auxiliary/scanner/finger/finger_users.rb +++ b/modules/auxiliary/scanner/finger/finger_users.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Finger Service User Enumerator', - 'Version' => '$Revision$', 'Description' => 'Identify valid users through the finger service using a variety of tricks', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/ftp/anonymous.rb b/modules/auxiliary/scanner/ftp/anonymous.rb index 308f9e287d..65f162e2a5 100644 --- a/modules/auxiliary/scanner/ftp/anonymous.rb +++ b/modules/auxiliary/scanner/ftp/anonymous.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Anonymous FTP Access Detection', - 'Version' => '$Revision$', 'Description' => 'Detect anonymous (read/write) FTP server access.', 'References' => [ diff --git a/modules/auxiliary/scanner/ftp/ftp_login.rb b/modules/auxiliary/scanner/ftp/ftp_login.rb index 0dd756de27..638fa072fb 100644 --- a/modules/auxiliary/scanner/ftp/ftp_login.rb +++ b/modules/auxiliary/scanner/ftp/ftp_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'FTP Authentication Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test FTP logins on a range of machines and report successful logins. If you have loaded a database plugin diff --git a/modules/auxiliary/scanner/ftp/ftp_version.rb b/modules/auxiliary/scanner/ftp/ftp_version.rb index 78ac32a09e..19084ff194 100644 --- a/modules/auxiliary/scanner/ftp/ftp_version.rb +++ b/modules/auxiliary/scanner/ftp/ftp_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'FTP Version Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect FTP Version.', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/h323/h323_version.rb b/modules/auxiliary/scanner/h323/h323_version.rb index 46996d1f8f..e5132ba851 100644 --- a/modules/auxiliary/scanner/h323/h323_version.rb +++ b/modules/auxiliary/scanner/h323/h323_version.rb @@ -16,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'H.323 Version Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect H.323 Version.', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/adobe_xml_inject.rb b/modules/auxiliary/scanner/http/adobe_xml_inject.rb index a0bd89d9c0..7e923e84d8 100644 --- a/modules/auxiliary/scanner/http/adobe_xml_inject.rb +++ b/modules/auxiliary/scanner/http/adobe_xml_inject.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Adobe XML External Entity Injection', - 'Version' => '$Revision$', 'Description' => %q{ Multiple Adobe Products -- XML External Entity Injection. Affected Sofware: BlazeDS 3.2 and earlier versions, LiveCycle 9.0, 8.2.1, and 8.0.1, LiveCycle Data Services 3.0, 2.6.1, and diff --git a/modules/auxiliary/scanner/http/apache_userdir_enum.rb b/modules/auxiliary/scanner/http/apache_userdir_enum.rb index 6aec8cad4f..f65e278997 100644 --- a/modules/auxiliary/scanner/http/apache_userdir_enum.rb +++ b/modules/auxiliary/scanner/http/apache_userdir_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Apache "mod_userdir" User Enumeration', - 'Version' => '$Revision$', 'Description' => %q{Apache with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the diff --git a/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb b/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb index 3d479efee3..5226c8f967 100644 --- a/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb +++ b/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb @@ -16,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'Atlassian Crowd XML Entity Expansion Remote File Access', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to read a remote file from the server using a vulnerability in the way Atlassian Crowd handles XML files. The vulnerability diff --git a/modules/auxiliary/scanner/http/axis_local_file_include.rb b/modules/auxiliary/scanner/http/axis_local_file_include.rb index 10ed923407..57734b0e60 100644 --- a/modules/auxiliary/scanner/http/axis_local_file_include.rb +++ b/modules/auxiliary/scanner/http/axis_local_file_include.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Apache Axis2 v1.4.1 Local File Inclusion', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits an Apache Axis2 v1.4.1 local file inclusion (LFI) vulnerability. By loading a local XML file which contains a cleartext username and password, attackers can trivially diff --git a/modules/auxiliary/scanner/http/axis_login.rb b/modules/auxiliary/scanner/http/axis_login.rb index a6748b4452..8607eb1db3 100644 --- a/modules/auxiliary/scanner/http/axis_login.rb +++ b/modules/auxiliary/scanner/http/axis_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Apache Axis2 v1.4.1 Brute Force Utility', - 'Version' => '$Revision$', 'Description' => %q{This module attempts to login to an Apache Axis2 v1.4.1 instance using username and password combindations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options. diff --git a/modules/auxiliary/scanner/http/backup_file.rb b/modules/auxiliary/scanner/http/backup_file.rb index 9e252f2b4c..2aec802d2b 100644 --- a/modules/auxiliary/scanner/http/backup_file.rb +++ b/modules/auxiliary/scanner/http/backup_file.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary of a specific file in a given path. }, 'Author' => [ 'et [at] cyberspace.org' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb b/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb index 59785ccd78..89bc219d42 100644 --- a/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb +++ b/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Barracuda Multiple Product "locale" Directory Traversal', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits a directory traversal vulnerability present in serveral Barracuda products, including the Barracuda Spam and Virus Firewall, diff --git a/modules/auxiliary/scanner/http/blind_sql_query.rb b/modules/auxiliary/scanner/http/blind_sql_query.rb index b9ce76ec5a..10ff301f72 100644 --- a/modules/auxiliary/scanner/http/blind_sql_query.rb +++ b/modules/auxiliary/scanner/http/blind_sql_query.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary in GET/POST Query parameters values. }, 'Author' => [ 'et [at] cyberspace.org' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/brute_dirs.rb b/modules/auxiliary/scanner/http/brute_dirs.rb index 731f417f92..df22ba26e7 100644 --- a/modules/auxiliary/scanner/http/brute_dirs.rb +++ b/modules/auxiliary/scanner/http/brute_dirs.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'et' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/cert.rb b/modules/auxiliary/scanner/http/cert.rb index c9bfe79e2c..d240995b6a 100644 --- a/modules/auxiliary/scanner/http/cert.rb +++ b/modules/auxiliary/scanner/http/cert.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP SSL Certificate Checker', - 'Version' => '$Revision$', 'Author' => 'nebulus', 'License' => MSF_LICENSE, 'Description' => %q{ diff --git a/modules/auxiliary/scanner/http/cisco_device_manager.rb b/modules/auxiliary/scanner/http/cisco_device_manager.rb index 70bfe3f04d..fd57fda9bb 100644 --- a/modules/auxiliary/scanner/http/cisco_device_manager.rb +++ b/modules/auxiliary/scanner/http/cisco_device_manager.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -35,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '1846'], diff --git a/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb b/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb index 80500f00f0..ce6b288c0d 100644 --- a/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb +++ b/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -37,7 +33,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Patrick Webster ', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'BID', '2936'], diff --git a/modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb b/modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb index 24cc6c3d86..1f25db1cc6 100644 --- a/modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb +++ b/modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Cisco Network Access Manager Directory Traversal Vulnerability', - 'Version' => '$Revision$', 'Description' => %q{ This module tests whether a directory traversal vulnerablity is present in versions of Cisco Network Access Manager 4.8.x You may wish to change diff --git a/modules/auxiliary/scanner/http/cold_fusion_version.rb b/modules/auxiliary/scanner/http/cold_fusion_version.rb index 176e90923f..92aaba751e 100644 --- a/modules/auxiliary/scanner/http/cold_fusion_version.rb +++ b/modules/auxiliary/scanner/http/cold_fusion_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'ColdFusion Version Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts identify various flavors of ColdFusion as well as the underlying OS }, diff --git a/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb b/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb index db1ed88bd2..9bdb5cdc5f 100644 --- a/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb +++ b/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'ColdFusion Server Check', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to exploit the directory traversal in the 'locale' attribute. According to the advisory the following versions are vulnerable: diff --git a/modules/auxiliary/scanner/http/copy_of_file.rb b/modules/auxiliary/scanner/http/copy_of_file.rb index a5e1f1a7c8..0e50dc2e32 100644 --- a/modules/auxiliary/scanner/http/copy_of_file.rb +++ b/modules/auxiliary/scanner/http/copy_of_file.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary of a specific file in a given path. }, 'Author' => [ 'et [at] cyberspace.org' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/crawler.rb b/modules/auxiliary/scanner/http/crawler.rb index 5b71b8a1ce..6d50554d98 100644 --- a/modules/auxiliary/scanner/http/crawler.rb +++ b/modules/auxiliary/scanner/http/crawler.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Web Site Crawler', - 'Version' => '$Revision$', 'Description' => 'Crawl a web site and store information about what was found', 'Author' => %w(hdm tasos), 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/dell_idrac.rb b/modules/auxiliary/scanner/http/dell_idrac.rb index fe999bef2b..6d0a97093c 100644 --- a/modules/auxiliary/scanner/http/dell_idrac.rb +++ b/modules/auxiliary/scanner/http/dell_idrac.rb @@ -17,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Dell iDRAC default Login', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to login to a iDRAC webserver instance using default username and password. Tested against Dell Remote Access diff --git a/modules/auxiliary/scanner/http/dir_listing.rb b/modules/auxiliary/scanner/http/dir_listing.rb index 9a2f5b2823..934dbc3083 100644 --- a/modules/auxiliary/scanner/http/dir_listing.rb +++ b/modules/auxiliary/scanner/http/dir_listing.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary in a given directory path. }, 'Author' => [ 'et' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/dir_scanner.rb b/modules/auxiliary/scanner/http/dir_scanner.rb index 53ddb8dd60..0127ab6f0e 100644 --- a/modules/auxiliary/scanner/http/dir_scanner.rb +++ b/modules/auxiliary/scanner/http/dir_scanner.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary in a given directory path. }, 'Author' => [ 'et [at] metasploit.com' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/dir_webdav_unicode_bypass.rb b/modules/auxiliary/scanner/http/dir_webdav_unicode_bypass.rb index 00b07c63ac..6f7609e06c 100644 --- a/modules/auxiliary/scanner/http/dir_webdav_unicode_bypass.rb +++ b/modules/auxiliary/scanner/http/dir_webdav_unicode_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -40,8 +36,7 @@ class Metasploit3 < Msf::Auxiliary [ 'CVE', '2009-1122' ], [ 'OSVDB', '54555' ], [ 'BID', '34993' ], - ], - 'Version' => '$Revision$')) + ])) register_options( [ diff --git a/modules/auxiliary/scanner/http/enum_wayback.rb b/modules/auxiliary/scanner/http/enum_wayback.rb index 15f821499e..62922bf205 100644 --- a/modules/auxiliary/scanner/http/enum_wayback.rb +++ b/modules/auxiliary/scanner/http/enum_wayback.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,8 +19,7 @@ class Metasploit3 < Msf::Auxiliary replaying during a web assessment. Finding unlinked and old pages. }, 'Author' => [ 'mubix' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( [ diff --git a/modules/auxiliary/scanner/http/error_sql_injection.rb b/modules/auxiliary/scanner/http/error_sql_injection.rb index 277dd489e2..33c889dcc8 100644 --- a/modules/auxiliary/scanner/http/error_sql_injection.rb +++ b/modules/auxiliary/scanner/http/error_sql_injection.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'et [at] cyberspace.org' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/file_same_name_dir.rb b/modules/auxiliary/scanner/http/file_same_name_dir.rb index 7c12c8e3ef..7b7b818d21 100644 --- a/modules/auxiliary/scanner/http/file_same_name_dir.rb +++ b/modules/auxiliary/scanner/http/file_same_name_dir.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary Only works if PATH is differenet than '/'. }, 'Author' => [ 'et [at] metasploit.com' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/files_dir.rb b/modules/auxiliary/scanner/http/files_dir.rb index e684ba8d6c..dbed24a165 100644 --- a/modules/auxiliary/scanner/http/files_dir.rb +++ b/modules/auxiliary/scanner/http/files_dir.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary in a given directory path. }, 'Author' => [ 'et' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/frontpage_login.rb b/modules/auxiliary/scanner/http/frontpage_login.rb index 21d0dfb878..f280f16494 100644 --- a/modules/auxiliary/scanner/http/frontpage_login.rb +++ b/modules/auxiliary/scanner/http/frontpage_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'FrontPage Server Extensions Anonymous Login Scanner', - 'Version' => '$Revision$', 'Description' => 'This module queries the FrontPage Server Extensions and determines whether anonymous access is allowed.', 'References' => [ diff --git a/modules/auxiliary/scanner/http/glassfish_login.rb b/modules/auxiliary/scanner/http/glassfish_login.rb index c8ac957801..fb93096629 100644 --- a/modules/auxiliary/scanner/http/glassfish_login.rb +++ b/modules/auxiliary/scanner/http/glassfish_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'GlassFish Brute Force Utility', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to login to GlassFish instance using username and password combindations indicated by the USER_FILE, PASS_FILE, diff --git a/modules/auxiliary/scanner/http/http_login.rb b/modules/auxiliary/scanner/http/http_login.rb index 45d8c69603..5a6b0ab9a6 100644 --- a/modules/auxiliary/scanner/http/http_login.rb +++ b/modules/auxiliary/scanner/http/http_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP Login Utility', - 'Version' => '$Revision$', 'Description' => 'This module attempts to authenticate to an HTTP service.', 'References' => [ diff --git a/modules/auxiliary/scanner/http/http_put.rb b/modules/auxiliary/scanner/http/http_put.rb index 9bbc8b123e..5776eaf57c 100644 --- a/modules/auxiliary/scanner/http/http_put.rb +++ b/modules/auxiliary/scanner/http/http_put.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP Writable Path PUT/DELETE File Access', - 'Version' => '$Revision$', 'Description' => %q{ This module can abuse misconfigured web servers to upload and delete web content via PUT and DELETE HTTP requests. Set ACTION to either PUT or DELETE. diff --git a/modules/auxiliary/scanner/http/http_version.rb b/modules/auxiliary/scanner/http/http_version.rb index 0e7b0936bd..a7fc335b15 100644 --- a/modules/auxiliary/scanner/http/http_version.rb +++ b/modules/auxiliary/scanner/http/http_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP Version Detection', - 'Version' => '$Revision$', 'Description' => 'Display version information about each system', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/httpbl_lookup.rb b/modules/auxiliary/scanner/http/httpbl_lookup.rb index ebb13a1247..d036856766 100644 --- a/modules/auxiliary/scanner/http/httpbl_lookup.rb +++ b/modules/auxiliary/scanner/http/httpbl_lookup.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'mubix' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://www.projecthoneypot.org/httpbl_api.php'], diff --git a/modules/auxiliary/scanner/http/impersonate_ssl.rb b/modules/auxiliary/scanner/http/impersonate_ssl.rb index 021a4ae319..0a1f0328b0 100644 --- a/modules/auxiliary/scanner/http/impersonate_ssl.rb +++ b/modules/auxiliary/scanner/http/impersonate_ssl.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/scanner/http/jboss_vulnscan.rb b/modules/auxiliary/scanner/http/jboss_vulnscan.rb index 407028750b..d6dc7c3638 100644 --- a/modules/auxiliary/scanner/http/jboss_vulnscan.rb +++ b/modules/auxiliary/scanner/http/jboss_vulnscan.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary 'Description' => %q{ This module scans a JBoss instance for a few vulnerablities. }, - 'Version' => '$Revision$', 'Author' => [ 'Tyler Krpata' ], 'References' => [ diff --git a/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb b/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb index db5e8fc434..9d55b38c07 100644 --- a/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb +++ b/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary This module exploits a source code disclosure/download vulnerability in versions 4.0.14 and prior of LiteSpeed. }, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2333' ], diff --git a/modules/auxiliary/scanner/http/lucky_punch.rb b/modules/auxiliary/scanner/http/lucky_punch.rb index 1e03a0049e..a210e13120 100644 --- a/modules/auxiliary/scanner/http/lucky_punch.rb +++ b/modules/auxiliary/scanner/http/lucky_punch.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary XSS attack to redirect user browser to a attacker controller website. }, 'Author' => [ 'et' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb b/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb index b1947d197b..7842159cec 100644 --- a/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb +++ b/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary module will attempt to download the Majordomo config.pl file. }, 'Author' => ['Nikolas Sotiriu'], - 'Version' => '$Revision$', 'References' => [ ['OSVDB', '70762'], diff --git a/modules/auxiliary/scanner/http/mod_negotiation_brute.rb b/modules/auxiliary/scanner/http/mod_negotiation_brute.rb index ddb666f002..a44007273a 100644 --- a/modules/auxiliary/scanner/http/mod_negotiation_brute.rb +++ b/modules/auxiliary/scanner/http/mod_negotiation_brute.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary files found will be displayed. }, 'Author' => [ 'diablohorn [at] gmail.com' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$')) + 'License' => MSF_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/mod_negotiation_scanner.rb b/modules/auxiliary/scanner/http/mod_negotiation_scanner.rb index 8b82ba5100..9d55942f1c 100644 --- a/modules/auxiliary/scanner/http/mod_negotiation_scanner.rb +++ b/modules/auxiliary/scanner/http/mod_negotiation_scanner.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,8 +20,7 @@ class Metasploit3 < Msf::Auxiliary If the webserver has mod_negotiation enabled, the IP address will be displayed. }, 'Author' => [ 'diablohorn [at] gmail.com' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$')) + 'License' => MSF_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/ms09_020_webdav_unicode_bypass.rb b/modules/auxiliary/scanner/http/ms09_020_webdav_unicode_bypass.rb index 369dc94ca0..4a426c1a4f 100644 --- a/modules/auxiliary/scanner/http/ms09_020_webdav_unicode_bypass.rb +++ b/modules/auxiliary/scanner/http/ms09_020_webdav_unicode_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary protected folder requires either Basic, Digest or NTLM authentication. }, 'Author' => [ 'et', 'patrick' ], - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'References' => [ diff --git a/modules/auxiliary/scanner/http/nginx_source_disclosure.rb b/modules/auxiliary/scanner/http/nginx_source_disclosure.rb index 5f1e605b53..1a9613739e 100644 --- a/modules/auxiliary/scanner/http/nginx_source_disclosure.rb +++ b/modules/auxiliary/scanner/http/nginx_source_disclosure.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Nginx Source Code Disclosure/Download', - 'Version' => '$Revision$', 'Description' => %q{ This module exploits a source code disclosure/download vulnerability in versions 0.7 and 0.8 of the nginx web server. Versions 0.7.66 and 0.8.40 diff --git a/modules/auxiliary/scanner/http/open_proxy.rb b/modules/auxiliary/scanner/http/open_proxy.rb index d2fb147ec2..52d347ecd3 100644 --- a/modules/auxiliary/scanner/http/open_proxy.rb +++ b/modules/auxiliary/scanner/http/open_proxy.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'HTTP Open Proxy Detection', - 'Version' => '$Revision$', 'Description' => %q{ Checks if an HTTP proxy is open. False positive are avoided verifing the HTTP return code and matching a pattern. diff --git a/modules/auxiliary/scanner/http/options.rb b/modules/auxiliary/scanner/http/options.rb index 14587cb43a..d7430ffeb6 100644 --- a/modules/auxiliary/scanner/http/options.rb +++ b/modules/auxiliary/scanner/http/options.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP Options Detection', - 'Version' => '$Revision$', 'Description' => 'Display available HTTP options for each system', 'Author' => ['CG'], 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/http/prev_dir_same_name_file.rb b/modules/auxiliary/scanner/http/prev_dir_same_name_file.rb index 0b4bc6cd4c..ace0a05755 100644 --- a/modules/auxiliary/scanner/http/prev_dir_same_name_file.rb +++ b/modules/auxiliary/scanner/http/prev_dir_same_name_file.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary following files /backup/files.ext . }, 'Author' => [ 'et [at] metasploit.com' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/replace_ext.rb b/modules/auxiliary/scanner/http/replace_ext.rb index 58b490d8e9..18f166f7f9 100644 --- a/modules/auxiliary/scanner/http/replace_ext.rb +++ b/modules/auxiliary/scanner/http/replace_ext.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'et [at] cyberspace.org' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/rewrite_proxy_bypass.rb b/modules/auxiliary/scanner/http/rewrite_proxy_bypass.rb index 24cc5c5cf0..4ed5920b24 100644 --- a/modules/auxiliary/scanner/http/rewrite_proxy_bypass.rb +++ b/modules/auxiliary/scanner/http/rewrite_proxy_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -18,7 +14,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'Apache Reverse Proxy Bypass Vulnerability Scanner', - 'Version' => '$Revision$', 'Description' => %q{ Scan for poorly configured reverse proxy servers. By default, this module attempts to force the server to make diff --git a/modules/auxiliary/scanner/http/robots_txt.rb b/modules/auxiliary/scanner/http/robots_txt.rb index e276f7110f..a955b4f827 100644 --- a/modules/auxiliary/scanner/http/robots_txt.rb +++ b/modules/auxiliary/scanner/http/robots_txt.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP Robots.txt Content Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect robots.txt files and analize its content', 'Author' => ['et'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb index 602524000c..730217ba95 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SAP BusinessObjects User Bruteforcer', - 'Version' => '$Revision$', 'Description' => 'This module attempts to bruteforce SAP BusinessObjects users. The dswsbobje interface is only used to verify valid credentials for CmcApp. Therefore, any valid credentials that have been identified can be leveraged by diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb index cc3614f4e1..56a6b32f1f 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_user_brute_web.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SAP BusinessObjects Web User Bruteforcer', - 'Version' => '$Revision$', 'Description' => 'This module simply attempts to bruteforce SAP BusinessObjects users by using CmcApp.', 'References' => [ diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb b/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb index f6340d18f7..415ca736ee 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_user_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SAP BusinessObjects User Enumeration', - 'Version' => '$Revision$', 'Description' => %Q{ This module simply attempts to enumerate SAP BusinessObjects users.The dswsbobje interface is only used to verify valid diff --git a/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb b/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb index c69bdf58dd..be3de4bd49 100644 --- a/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb +++ b/modules/auxiliary/scanner/http/sap_businessobjects_version_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SAP BusinessObjects Version Detection', - 'Version' => '$Revision$', 'Description' => 'This module simply attempts to identify the version of SAP BusinessObjects.', 'References' => [ diff --git a/modules/auxiliary/scanner/http/scraper.rb b/modules/auxiliary/scanner/http/scraper.rb index d96026e52c..ee51941166 100644 --- a/modules/auxiliary/scanner/http/scraper.rb +++ b/modules/auxiliary/scanner/http/scraper.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP Page Scraper', - 'Version' => '$Revision$', 'Description' => 'Scrap defined data from a specific web page based on a regular expresion', 'Author' => ['et'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/soap_xml.rb b/modules/auxiliary/scanner/http/soap_xml.rb index b0a1d89626..7f1f3a9be5 100644 --- a/modules/auxiliary/scanner/http/soap_xml.rb +++ b/modules/auxiliary/scanner/http/soap_xml.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary hidden methods. }, 'Author' => [ 'patrick' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$')) + 'License' => MSF_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/sqlmap.rb b/modules/auxiliary/scanner/http/sqlmap.rb index 70722f8cf6..070f5515a6 100644 --- a/modules/auxiliary/scanner/http/sqlmap.rb +++ b/modules/auxiliary/scanner/http/sqlmap.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -36,7 +32,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Bernardo Damele A. G. ' ], 'License' => BSD_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://sqlmap.sourceforge.net'], diff --git a/modules/auxiliary/scanner/http/squid_pivot_scanning.rb b/modules/auxiliary/scanner/http/squid_pivot_scanning.rb index d90aca8404..731806c4c7 100644 --- a/modules/auxiliary/scanner/http/squid_pivot_scanning.rb +++ b/modules/auxiliary/scanner/http/squid_pivot_scanning.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -37,7 +33,6 @@ class Metasploit3 < Msf::Auxiliary the attack to pivot to another part of the network). }, 'Author' => ['willis'], - 'Version' => '$Revision$', 'References' => [ 'URL','http://wiki.squid-cache.org/SquidFaq/SecurityPitfalls' diff --git a/modules/auxiliary/scanner/http/squiz_matrix_user_enum.rb b/modules/auxiliary/scanner/http/squiz_matrix_user_enum.rb index e65f8e3838..8d9196efde 100644 --- a/modules/auxiliary/scanner/http/squiz_matrix_user_enum.rb +++ b/modules/auxiliary/scanner/http/squiz_matrix_user_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. @@ -37,7 +33,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Troy Rose ', 'patrick' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.osisecurity.com.au/advisories/' ], diff --git a/modules/auxiliary/scanner/http/ssl.rb b/modules/auxiliary/scanner/http/ssl.rb index f6910626fb..da51bf377f 100644 --- a/modules/auxiliary/scanner/http/ssl.rb +++ b/modules/auxiliary/scanner/http/ssl.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP SSL Certificate Information', - 'Version' => '$Revision$', 'Description' => 'Parse the server SSL certificate to obtain the common name and signature algorithm', 'Author' => [ diff --git a/modules/auxiliary/scanner/http/svn_scanner.rb b/modules/auxiliary/scanner/http/svn_scanner.rb index 3d530ce18a..65370ea458 100644 --- a/modules/auxiliary/scanner/http/svn_scanner.rb +++ b/modules/auxiliary/scanner/http/svn_scanner.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP Subversion Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect subversion directories and files and analize its content. Only SVN Version > 7 supported', 'Author' => ['et'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/tomcat_enum.rb b/modules/auxiliary/scanner/http/tomcat_enum.rb index 6c4097850b..fbfc1c6f99 100644 --- a/modules/auxiliary/scanner/http/tomcat_enum.rb +++ b/modules/auxiliary/scanner/http/tomcat_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Apache Tomcat User Enumeration', - 'Version' => '$Revision$', 'Description' => %q{ Apache Tomcat user enumeration utility, for Apache Tomcat servers prior to version 6.0.20, 5.5.28, and 4.1.40. diff --git a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb index aab3629812..fb6978cdea 100644 --- a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb +++ b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Tomcat Application Manager Login Utility', - 'Version' => '$Revision$', 'Description' => 'This module simply attempts to login to a Tomcat Application Manager instance using a specific user/pass.', 'References' => [ diff --git a/modules/auxiliary/scanner/http/trace.rb b/modules/auxiliary/scanner/http/trace.rb index 55c31af0dd..bdafbb01db 100644 --- a/modules/auxiliary/scanner/http/trace.rb +++ b/modules/auxiliary/scanner/http/trace.rb @@ -18,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP TRACE Detection', - 'Version' => '$Revision$', 'Description' => 'Test if TRACE is actually enabled. 405 (Apache) 501(IIS) if its disabled, 200 if it is', 'Author' => ['CG'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/trace_axd.rb b/modules/auxiliary/scanner/http/trace_axd.rb index 2925a46505..bcf15c8e93 100644 --- a/modules/auxiliary/scanner/http/trace_axd.rb +++ b/modules/auxiliary/scanner/http/trace_axd.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP trace.axd Content Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect trace.axd files and analize its content', 'Author' => ['c4an'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/verb_auth_bypass.rb b/modules/auxiliary/scanner/http/verb_auth_bypass.rb index 7d1e1dc37f..e2de4014d0 100644 --- a/modules/auxiliary/scanner/http/verb_auth_bypass.rb +++ b/modules/auxiliary/scanner/http/verb_auth_bypass.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'et [at] metasploit.com' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/vhost_scanner.rb b/modules/auxiliary/scanner/http/vhost_scanner.rb index 246faadc6e..76e0617f69 100644 --- a/modules/auxiliary/scanner/http/vhost_scanner.rb +++ b/modules/auxiliary/scanner/http/vhost_scanner.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -36,8 +32,7 @@ require 'cgi' }, 'Author' => [ 'et [at] cyberspace.org' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/vmware_server_dir_trav.rb b/modules/auxiliary/scanner/http/vmware_server_dir_trav.rb index 19a3c08d8d..99eebecee0 100644 --- a/modules/auxiliary/scanner/http/vmware_server_dir_trav.rb +++ b/modules/auxiliary/scanner/http/vmware_server_dir_trav.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMware Server Directory Traversal Vulnerability', - 'Version' => '$Revision$', 'Description' => 'This modules exploits the VMware Server Directory Traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 @@ -31,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary the gueststealer tool.', 'Author' => 'CG' , 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.vmware.com/security/advisories/VMSA-2009-0015.html' ], diff --git a/modules/auxiliary/scanner/http/web_vulndb.rb b/modules/auxiliary/scanner/http/web_vulndb.rb index 0fbb20fb4d..7682ea0268 100644 --- a/modules/auxiliary/scanner/http/web_vulndb.rb +++ b/modules/auxiliary/scanner/http/web_vulndb.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary This module identifies common vulnerable files or cgis. }, 'Author' => [ 'et' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/http/webdav_internal_ip.rb b/modules/auxiliary/scanner/http/webdav_internal_ip.rb index cd7ebb7de7..597e8190b4 100644 --- a/modules/auxiliary/scanner/http/webdav_internal_ip.rb +++ b/modules/auxiliary/scanner/http/webdav_internal_ip.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP WebDAV Internal IP Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect webservers internal IPs though WebDAV', 'Author' => ['et'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/webdav_scanner.rb b/modules/auxiliary/scanner/http/webdav_scanner.rb index 9d1deacf9a..66399b0fef 100644 --- a/modules/auxiliary/scanner/http/webdav_scanner.rb +++ b/modules/auxiliary/scanner/http/webdav_scanner.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP WebDAV Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect webservers with WebDAV enabled', 'Author' => ['et'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/webdav_website_content.rb b/modules/auxiliary/scanner/http/webdav_website_content.rb index 568414908b..08676d37ab 100644 --- a/modules/auxiliary/scanner/http/webdav_website_content.rb +++ b/modules/auxiliary/scanner/http/webdav_website_content.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'HTTP WebDAV Website Content Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect webservers disclosing its content though WebDAV', 'Author' => ['et'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/http/wordpress_login_enum.rb b/modules/auxiliary/scanner/http/wordpress_login_enum.rb index 08955c872f..85fd043d2b 100644 --- a/modules/auxiliary/scanner/http/wordpress_login_enum.rb +++ b/modules/auxiliary/scanner/http/wordpress_login_enum.rb @@ -138,8 +138,7 @@ class Metasploit3 < Msf::Auxiliary :sname => (ssl ? 'https' : 'http'), :user => user, :port => rport, - :proof => "WEBAPP=\"Wordpress\", VHOST=#{vhost}", - + :proof => "WEBAPP=\"Wordpress\", VHOST=#{vhost}" ) @users_found[user] = :reported diff --git a/modules/auxiliary/scanner/http/xpath.rb b/modules/auxiliary/scanner/http/xpath.rb index 81e7c75515..a5f23da17e 100644 --- a/modules/auxiliary/scanner/http/xpath.rb +++ b/modules/auxiliary/scanner/http/xpath.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary This module exploits blind XPATH 1.0 injections over HTTP GET requests. }, 'Author' => [ 'et [at] metasploit . com' ], - 'License' => BSD_LICENSE, - 'Version' => '$Revision$')) + 'License' => BSD_LICENSE)) register_options( [ diff --git a/modules/auxiliary/scanner/imap/imap_version.rb b/modules/auxiliary/scanner/imap/imap_version.rb index b3de6171cd..7c62b4ca6a 100644 --- a/modules/auxiliary/scanner/imap/imap_version.rb +++ b/modules/auxiliary/scanner/imap/imap_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'IMAP4 Banner Grabber', - 'Version' => '$Revision$', 'Description' => 'IMAP4 Banner Grabber', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/ip/ipidseq.rb b/modules/auxiliary/scanner/ip/ipidseq.rb index b707128ffc..03e5aa94f5 100644 --- a/modules/auxiliary/scanner/ip/ipidseq.rb +++ b/modules/auxiliary/scanner/ip/ipidseq.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -35,8 +31,7 @@ class Metasploit3 < Msf::Auxiliary classified as "Incremental" or "Broken little-endian incremental". }, 'Author' => 'kris katterjohn', - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE ) register_options([ diff --git a/modules/auxiliary/scanner/lotus/lotus_domino_hashes.rb b/modules/auxiliary/scanner/lotus/lotus_domino_hashes.rb index 9fb1bebbdd..8f4925b0da 100644 --- a/modules/auxiliary/scanner/lotus/lotus_domino_hashes.rb +++ b/modules/auxiliary/scanner/lotus/lotus_domino_hashes.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Lotus Domino Password Hash Collector', - 'Version' => '$Revision$', 'Description' => 'Get users passwords hashes from names.nsf page', 'Author' => 'Tiago Ferreira ', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/lotus/lotus_domino_login.rb b/modules/auxiliary/scanner/lotus/lotus_domino_login.rb index b62af0c634..769d271791 100644 --- a/modules/auxiliary/scanner/lotus/lotus_domino_login.rb +++ b/modules/auxiliary/scanner/lotus/lotus_domino_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Lotus Domino Brute Force Utility', - 'Version' => '$Revision$', 'Description' => 'Lotus Domino Authentication Brute Force Utility', 'Author' => 'Tiago Ferreira ', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/lotus/lotus_domino_version.rb b/modules/auxiliary/scanner/lotus/lotus_domino_version.rb index 7eb0476ea5..e41069737e 100644 --- a/modules/auxiliary/scanner/lotus/lotus_domino_version.rb +++ b/modules/auxiliary/scanner/lotus/lotus_domino_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Lotus Domino Version', - 'Version' => '$Revision$', 'Description' => 'Several checks to determine Lotus Domino Server Version.', 'Author' => ['CG'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb b/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb index f02715358f..6c980bbeb1 100644 --- a/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb +++ b/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary and implementation of the InterBase server from InterBase Services Manager. }, - 'Version' => '$Revision$', 'Author' => [ 'Ramon de C Valle', diff --git a/modules/auxiliary/scanner/misc/java_rmi_server.rb b/modules/auxiliary/scanner/misc/java_rmi_server.rb index c5c7c0b936..ac632652e6 100644 --- a/modules/auxiliary/scanner/misc/java_rmi_server.rb +++ b/modules/auxiliary/scanner/misc/java_rmi_server.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Java RMI Server Insecure Endpoint Code Execution Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect Java RMI endpoints', 'Author' => ['mihi', 'hdm'], 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/misc/redis_server.rb b/modules/auxiliary/scanner/misc/redis_server.rb index 6d41cd5374..6437aa5f4a 100644 --- a/modules/auxiliary/scanner/misc/redis_server.rb +++ b/modules/auxiliary/scanner/misc/redis_server.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info={}) super(update_info(info, 'Name' => 'Redis-server Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module scans for Redis server. By default Redis has no auth. If auth (password only) is used, it is then possible to execute a brute force attack on diff --git a/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb b/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb index 11507e867a..c2d6a49c64 100644 --- a/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb +++ b/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Rosewill RXS-3211 IP Camera Password Retriever', - 'Version' => '$Revision$', 'Description' => %q{ This module takes advantage of a protocol design issue with the Rosewill admin executable in order to retrieve passwords, allowing remote attackers to take diff --git a/modules/auxiliary/scanner/misc/sunrpc_portmapper.rb b/modules/auxiliary/scanner/misc/sunrpc_portmapper.rb index a608e03297..7732e03cf6 100644 --- a/modules/auxiliary/scanner/misc/sunrpc_portmapper.rb +++ b/modules/auxiliary/scanner/misc/sunrpc_portmapper.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary program entries and their running port numbers. }, 'Author' => [''], - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://www.ietf.org/rfc/rfc1057.txt'], diff --git a/modules/auxiliary/scanner/motorola/timbuktu_udp.rb b/modules/auxiliary/scanner/motorola/timbuktu_udp.rb index 89953a2aee..d0d0c489a0 100644 --- a/modules/auxiliary/scanner/motorola/timbuktu_udp.rb +++ b/modules/auxiliary/scanner/motorola/timbuktu_udp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => ['MC'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'DisclosureDate' => 'Sep 25 2009' )) diff --git a/modules/auxiliary/scanner/mssql/mssql_hashdump.rb b/modules/auxiliary/scanner/mssql/mssql_hashdump.rb index 0b49f9b85c..a07f5418c2 100644 --- a/modules/auxiliary/scanner/mssql/mssql_hashdump.rb +++ b/modules/auxiliary/scanner/mssql/mssql_hashdump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'MSSQL Password Hashdump', - 'Version' => '$Revision$', 'Description' => %Q{ This module extracts the usernames and encrypted password hashes from a MSSQL server and stores them for later cracking. diff --git a/modules/auxiliary/scanner/mssql/mssql_login.rb b/modules/auxiliary/scanner/mssql/mssql_login.rb index 462685ac2b..0016810eb1 100644 --- a/modules/auxiliary/scanner/mssql/mssql_login.rb +++ b/modules/auxiliary/scanner/mssql/mssql_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'MSSQL Login Utility', - 'Version' => '$Revision$', 'Description' => 'This module simply queries the MSSQL instance for a specific user/pass (default is sa with blank).', 'Author' => 'MC', 'References' => diff --git a/modules/auxiliary/scanner/mssql/mssql_ping.rb b/modules/auxiliary/scanner/mssql/mssql_ping.rb index d8c3d06194..d541980f1e 100644 --- a/modules/auxiliary/scanner/mssql/mssql_ping.rb +++ b/modules/auxiliary/scanner/mssql/mssql_ping.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'MSSQL Ping Utility', - 'Version' => '$Revision$', 'Description' => 'This module simply queries the MSSQL instance for information.', 'Author' => 'MC', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/mssql/mssql_schemadump.rb b/modules/auxiliary/scanner/mssql/mssql_schemadump.rb index 5096044c48..a63a7bc73a 100644 --- a/modules/auxiliary/scanner/mssql/mssql_schemadump.rb +++ b/modules/auxiliary/scanner/mssql/mssql_schemadump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb index 142ef2350d..77bc86879a 100644 --- a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'MySQL Authentication Bypass Password Dump', - 'Version' => '$Revision$', 'Description' => %Q{ This module exploits a password bypass vulnerability in MySQL in order to extract the usernames and encrypted password hashes from a MySQL server. diff --git a/modules/auxiliary/scanner/mysql/mysql_hashdump.rb b/modules/auxiliary/scanner/mysql/mysql_hashdump.rb index f9782c9b9e..229cbafdc7 100644 --- a/modules/auxiliary/scanner/mysql/mysql_hashdump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_hashdump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'MYSQL Password Hashdump', - 'Version' => '$Revision$', 'Description' => %Q{ This module extracts the usernames and encrypted password hashes from a MySQL server and stores them for later cracking. diff --git a/modules/auxiliary/scanner/mysql/mysql_login.rb b/modules/auxiliary/scanner/mysql/mysql_login.rb index df31b12700..a39de92313 100644 --- a/modules/auxiliary/scanner/mysql/mysql_login.rb +++ b/modules/auxiliary/scanner/mysql/mysql_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ [ 'CVE', '1999-0502'] # Weak password - ], - 'Version' => '$Revision$' + ] )) end diff --git a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb index 1a15a2bb30..27627da977 100644 --- a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'MYSQL Schema Dump', - 'Version' => '$Revision$', 'Description' => %Q{ This module extracts the schema information from a MySQL DB server. diff --git a/modules/auxiliary/scanner/mysql/mysql_version.rb b/modules/auxiliary/scanner/mysql/mysql_version.rb index 8ba017177e..033c134151 100644 --- a/modules/auxiliary/scanner/mysql/mysql_version.rb +++ b/modules/auxiliary/scanner/mysql/mysql_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary 'Description' => %q{ Enumerates the version of MySQL servers }, - 'Version' => '$Revision$', 'Author' => 'kris katterjohn', 'License' => MSF_LICENSE ) diff --git a/modules/auxiliary/scanner/netbios/nbname.rb b/modules/auxiliary/scanner/netbios/nbname.rb index d965b74e2d..ecfc066a04 100644 --- a/modules/auxiliary/scanner/netbios/nbname.rb +++ b/modules/auxiliary/scanner/netbios/nbname.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'NetBIOS Information Discovery', - 'Version' => '$Revision$', 'Description' => 'Discover host information through NetBIOS', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/netbios/nbname_probe.rb b/modules/auxiliary/scanner/netbios/nbname_probe.rb index 84680d406e..5e52d6dc7f 100644 --- a/modules/auxiliary/scanner/netbios/nbname_probe.rb +++ b/modules/auxiliary/scanner/netbios/nbname_probe.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'NetBIOS Information Discovery Prober', - 'Version' => '$Revision$', 'Description' => 'Discover host information using sequential NetBIOS Probes', 'Author' => ['hdm', 'todb'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/nfs/nfsmount.rb b/modules/auxiliary/scanner/nfs/nfsmount.rb index d5265eebea..1de98fba25 100644 --- a/modules/auxiliary/scanner/nfs/nfsmount.rb +++ b/modules/auxiliary/scanner/nfs/nfsmount.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary This module scans NFS mounts and their permissions. }, 'Author' => [''], - 'Version' => '$Revision$', 'References' => [ ['CVE', '1999-0170'], diff --git a/modules/auxiliary/scanner/ntp/ntp_monlist.rb b/modules/auxiliary/scanner/ntp/ntp_monlist.rb index 4df4e02ae1..676b534677 100644 --- a/modules/auxiliary/scanner/ntp/ntp_monlist.rb +++ b/modules/auxiliary/scanner/ntp/ntp_monlist.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'NTP Monitor List Scanner', - 'Version' => '$Revision$', 'Description' => 'Obtain the list of recent clients from an NTP server', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/oracle/emc_sid.rb b/modules/auxiliary/scanner/oracle/emc_sid.rb index 27a4bea0ea..eb1f221ba4 100644 --- a/modules/auxiliary/scanner/oracle/emc_sid.rb +++ b/modules/auxiliary/scanner/oracle/emc_sid.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary This module makes a request to the Oracle Enterprise Manager Control Console in an attempt to discover the SID. }, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://dsecrg.com/files/pub/pdf/Different_ways_to_guess_Oracle_database_SID_(eng).pdf' ], diff --git a/modules/auxiliary/scanner/oracle/isqlplus_login.rb b/modules/auxiliary/scanner/oracle/isqlplus_login.rb index 5abfb3f68c..150d6a5463 100644 --- a/modules/auxiliary/scanner/oracle/isqlplus_login.rb +++ b/modules/auxiliary/scanner/oracle/isqlplus_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Oracle iSQL*Plus Login Utility', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to authenticate against an Oracle ISQL*Plus administration web site using username and password combinations indicated diff --git a/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb b/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb index e742578162..a4b51ffa92 100644 --- a/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb +++ b/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Oracle isqlplus SID Check', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to bruteforce the SID on the Oracle application server iSQL*Plus login pages. It does this by testing Oracle error responses returned in the HTTP response. diff --git a/modules/auxiliary/scanner/oracle/oracle_hashdump.rb b/modules/auxiliary/scanner/oracle/oracle_hashdump.rb index ea08ad3445..b11a8bef81 100644 --- a/modules/auxiliary/scanner/oracle/oracle_hashdump.rb +++ b/modules/auxiliary/scanner/oracle/oracle_hashdump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Oracle Password Hashdump', - 'Version' => '$Revision$', 'Description' => %Q{ This module dumps the usernames and password hashes from Oracle given the proper Credentials and SID. diff --git a/modules/auxiliary/scanner/oracle/oracle_login.rb b/modules/auxiliary/scanner/oracle/oracle_login.rb index 1e804f960e..3869c4c321 100644 --- a/modules/auxiliary/scanner/oracle/oracle_login.rb +++ b/modules/auxiliary/scanner/oracle/oracle_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -37,8 +33,7 @@ class Metasploit3 < Msf::Auxiliary [ 'URL', 'http://www.oracle.com/us/products/database/index.html' ], [ 'CVE', '1999-0502'], # Weak password CVE [ 'URL', 'http://nmap.org/nsedoc/scripts/oracle-brute.html'] - ], - 'Version' => '$Revision$' + ] )) register_options( diff --git a/modules/auxiliary/scanner/oracle/sid_brute.rb b/modules/auxiliary/scanner/oracle/sid_brute.rb index 44940aa7af..2a23ef7a6e 100644 --- a/modules/auxiliary/scanner/oracle/sid_brute.rb +++ b/modules/auxiliary/scanner/oracle/sid_brute.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,8 +25,7 @@ class Metasploit3 < Msf::Auxiliary SIDs read from the named file will be attempted in sequence instead. }, 'Author' => [ 'todb' ], - 'License' => MSF_LICENSE, - 'Version' => '$Revision$' + 'License' => MSF_LICENSE )) register_options( diff --git a/modules/auxiliary/scanner/oracle/sid_enum.rb b/modules/auxiliary/scanner/oracle/sid_enum.rb index f86c381db4..fb8509adf5 100644 --- a/modules/auxiliary/scanner/oracle/sid_enum.rb +++ b/modules/auxiliary/scanner/oracle/sid_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'CG', 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'DisclosureDate' => 'Jan 7 2009' )) diff --git a/modules/auxiliary/scanner/oracle/spy_sid.rb b/modules/auxiliary/scanner/oracle/spy_sid.rb index b379a05843..5326fc21a2 100644 --- a/modules/auxiliary/scanner/oracle/spy_sid.rb +++ b/modules/auxiliary/scanner/oracle/spy_sid.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary This module makes a request to the Oracle Application Server in an attempt to discover the SID. }, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://dsecrg.com/files/pub/pdf/Different_ways_to_guess_Oracle_database_SID_(eng).pdf' ], diff --git a/modules/auxiliary/scanner/oracle/tnslsnr_version.rb b/modules/auxiliary/scanner/oracle/tnslsnr_version.rb index b67bac6636..e9c6e24622 100644 --- a/modules/auxiliary/scanner/oracle/tnslsnr_version.rb +++ b/modules/auxiliary/scanner/oracle/tnslsnr_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => ['CG'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'DisclosureDate' => 'Jan 7 2009')) register_options( diff --git a/modules/auxiliary/scanner/oracle/xdb_sid.rb b/modules/auxiliary/scanner/oracle/xdb_sid.rb index 3b4ee0101d..df0ab6d9aa 100644 --- a/modules/auxiliary/scanner/oracle/xdb_sid.rb +++ b/modules/auxiliary/scanner/oracle/xdb_sid.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary This module simply makes a authenticated request to retrieve the sid from the Oracle XML DB httpd server. }, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://dsecrg.com/files/pub/pdf/Different_ways_to_guess_Oracle_database_SID_(eng).pdf' ], diff --git a/modules/auxiliary/scanner/oracle/xdb_sid_brute.rb b/modules/auxiliary/scanner/oracle/xdb_sid_brute.rb index 6906784798..aa3f7baec7 100644 --- a/modules/auxiliary/scanner/oracle/xdb_sid_brute.rb +++ b/modules/auxiliary/scanner/oracle/xdb_sid_brute.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary This module attempts to retrieve the sid from the Oracle XML DB httpd server, utilizing Pete Finnigan's default oracle password list. }, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://dsecrg.com/files/pub/pdf/Different_ways_to_guess_Oracle_database_SID_(eng).pdf' ], diff --git a/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb b/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb index 0734bafe48..e89007576c 100644 --- a/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb +++ b/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'PcAnywhere Login Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test pcAnywhere logins on a range of machines and report successful logins. diff --git a/modules/auxiliary/scanner/pcanywhere/pcanywhere_tcp.rb b/modules/auxiliary/scanner/pcanywhere/pcanywhere_tcp.rb index 8c39d1dfa4..61a162fd3e 100644 --- a/modules/auxiliary/scanner/pcanywhere/pcanywhere_tcp.rb +++ b/modules/auxiliary/scanner/pcanywhere/pcanywhere_tcp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'PcAnywhere TCP Service Discovery', - 'Version' => '$Revision$', 'Description' => 'Discover active pcAnywhere services through TCP', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb b/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb index 0ba7439fdb..76fc5777b8 100644 --- a/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb +++ b/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'PcAnywhere UDP Service Discovery', - 'Version' => '$Revision$', 'Description' => 'Discover active pcAnywhere services through UDP', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/pop3/pop3_login.rb b/modules/auxiliary/scanner/pop3/pop3_login.rb index c713b64403..e895ba5546 100644 --- a/modules/auxiliary/scanner/pop3/pop3_login.rb +++ b/modules/auxiliary/scanner/pop3/pop3_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary super( 'Name' => 'POP3 Login Utility', 'Description' => 'This module attempts to authenticate to an POP3 service.', - 'Version' => '$Revision$', 'Author' => [ '==[ Alligator Security Team ]==', diff --git a/modules/auxiliary/scanner/pop3/pop3_version.rb b/modules/auxiliary/scanner/pop3/pop3_version.rb index e5eb4386f9..9131397296 100644 --- a/modules/auxiliary/scanner/pop3/pop3_version.rb +++ b/modules/auxiliary/scanner/pop3/pop3_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'POP3 Banner Grabber', - 'Version' => '$Revision$', 'Description' => 'POP3 Banner Grabber', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/portscan/ack.rb b/modules/auxiliary/scanner/portscan/ack.rb index 8025687e7f..ff8c9578c0 100644 --- a/modules/auxiliary/scanner/portscan/ack.rb +++ b/modules/auxiliary/scanner/portscan/ack.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary not in place for them. }, 'Author' => 'kris katterjohn', - 'Version' => '$Revision$', # 03/26/2009 'License' => MSF_LICENSE ) diff --git a/modules/auxiliary/scanner/portscan/ftpbounce.rb b/modules/auxiliary/scanner/portscan/ftpbounce.rb index a06963bc80..a47a8eb7d1 100644 --- a/modules/auxiliary/scanner/portscan/ftpbounce.rb +++ b/modules/auxiliary/scanner/portscan/ftpbounce.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'FTP Bounce Port Scanner', - 'Version' => '$Revision$', 'Description' => %q{ Enumerate TCP services via the FTP bounce PORT/LIST method, which can still come in handy every once in diff --git a/modules/auxiliary/scanner/portscan/syn.rb b/modules/auxiliary/scanner/portscan/syn.rb index cf4d8307b9..8518543da5 100644 --- a/modules/auxiliary/scanner/portscan/syn.rb +++ b/modules/auxiliary/scanner/portscan/syn.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary Enumerate open TCP services using a raw SYN scan. }, 'Author' => 'kris katterjohn', - 'Version' => '$Revision$', # 03/26/2009 'License' => MSF_LICENSE ) diff --git a/modules/auxiliary/scanner/portscan/tcp.rb b/modules/auxiliary/scanner/portscan/tcp.rb index 709ef5c6ee..532e57e21f 100644 --- a/modules/auxiliary/scanner/portscan/tcp.rb +++ b/modules/auxiliary/scanner/portscan/tcp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'TCP Port Scanner', - 'Version' => '$Revision$', 'Description' => 'Enumerate open TCP services', 'Author' => [ 'hdm', 'kris katterjohn' ], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/portscan/xmas.rb b/modules/auxiliary/scanner/portscan/xmas.rb index fb045eef43..3335c64240 100644 --- a/modules/auxiliary/scanner/portscan/xmas.rb +++ b/modules/auxiliary/scanner/portscan/xmas.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary PSH and URG flags. }, 'Author' => 'kris katterjohn', - 'Version' => '$Revision$', # 04/08/2009 'License' => MSF_LICENSE ) diff --git a/modules/auxiliary/scanner/postgres/postgres_hashdump.rb b/modules/auxiliary/scanner/postgres/postgres_hashdump.rb index 4265640aae..711b782af4 100644 --- a/modules/auxiliary/scanner/postgres/postgres_hashdump.rb +++ b/modules/auxiliary/scanner/postgres/postgres_hashdump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Postgres Password Hashdump', - 'Version' => '$Revision$', 'Description' => %Q{ This module extracts the usernames and encrypted password hashes from a Postgres server and stores them for later cracking. diff --git a/modules/auxiliary/scanner/postgres/postgres_login.rb b/modules/auxiliary/scanner/postgres/postgres_login.rb index 58d0e643ba..d7cd2c5899 100644 --- a/modules/auxiliary/scanner/postgres/postgres_login.rb +++ b/modules/auxiliary/scanner/postgres/postgres_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -34,8 +30,7 @@ class Metasploit3 < Msf::Auxiliary [ [ 'URL', 'http://www.postgresql.org' ], [ 'CVE', '1999-0502'] # Weak password - ], - 'Version' => '$Revision$' + ] )) register_options( diff --git a/modules/auxiliary/scanner/postgres/postgres_schemadump.rb b/modules/auxiliary/scanner/postgres/postgres_schemadump.rb index d2e2c5761c..21b0c7e61c 100644 --- a/modules/auxiliary/scanner/postgres/postgres_schemadump.rb +++ b/modules/auxiliary/scanner/postgres/postgres_schemadump.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Postgres Schema Dump', - 'Version' => '$Revision$', 'Description' => %Q{ This module extracts the schema information from a Postgres server. diff --git a/modules/auxiliary/scanner/postgres/postgres_version.rb b/modules/auxiliary/scanner/postgres/postgres_version.rb index 99da31ebf7..c18f3c01a5 100644 --- a/modules/auxiliary/scanner/postgres/postgres_version.rb +++ b/modules/auxiliary/scanner/postgres/postgres_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,8 +26,7 @@ class Metasploit3 < Msf::Auxiliary 'References' => [ [ 'URL', 'http://www.postgresql.org' ] - ], - 'Version' => '$Revision$' # 2009-02-05 + ] )) register_options([ ], self.class) # None needed. diff --git a/modules/auxiliary/scanner/rogue/rogue_recv.rb b/modules/auxiliary/scanner/rogue/rogue_recv.rb index c9f26dc984..93b24e9c84 100644 --- a/modules/auxiliary/scanner/rogue/rogue_recv.rb +++ b/modules/auxiliary/scanner/rogue/rogue_recv.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'hdm', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://www.metasploit.com/research/projects/rogue_network/'], diff --git a/modules/auxiliary/scanner/rogue/rogue_send.rb b/modules/auxiliary/scanner/rogue/rogue_send.rb index aaa233305a..3e3a54308b 100644 --- a/modules/auxiliary/scanner/rogue/rogue_send.rb +++ b/modules/auxiliary/scanner/rogue/rogue_send.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => 'hdm', 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ['URL', 'http://www.metasploit.com/research/projects/rogue_network/'], diff --git a/modules/auxiliary/scanner/rservices/rexec_login.rb b/modules/auxiliary/scanner/rservices/rexec_login.rb index c0a403051b..e4d2aa496b 100644 --- a/modules/auxiliary/scanner/rservices/rexec_login.rb +++ b/modules/auxiliary/scanner/rservices/rexec_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'rexec Authentication Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test an rexec service on a range of machines and report successful logins. diff --git a/modules/auxiliary/scanner/rservices/rlogin_login.rb b/modules/auxiliary/scanner/rservices/rlogin_login.rb index 08a8ce8093..7dfdb9585b 100644 --- a/modules/auxiliary/scanner/rservices/rlogin_login.rb +++ b/modules/auxiliary/scanner/rservices/rlogin_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'rlogin Authentication Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test an rlogin service on a range of machines and report successful logins. diff --git a/modules/auxiliary/scanner/rservices/rsh_login.rb b/modules/auxiliary/scanner/rservices/rsh_login.rb index 78e16992f0..9840d58e36 100644 --- a/modules/auxiliary/scanner/rservices/rsh_login.rb +++ b/modules/auxiliary/scanner/rservices/rsh_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'rsh Authentication Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test a shell (rsh) service on a range of machines and report successful logins. diff --git a/modules/auxiliary/scanner/sap/sap_icm_urlscan.rb b/modules/auxiliary/scanner/sap/sap_icm_urlscan.rb index e936e6bc64..791392766b 100644 --- a/modules/auxiliary/scanner/sap/sap_icm_urlscan.rb +++ b/modules/auxiliary/scanner/sap/sap_icm_urlscan.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary This module scans for commonly found SAP Internet Communication Manager URLs and outputs return codes for the user. }, - 'Version' => '$Revision$', 'Author' => [ 'Chris John Riley' ], 'References' => [ diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb index 0e27e4a4c6..a3af96e649 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_abaplog.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console ABAP syslog', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to extract the ABAP syslog through the SAP Management Console SOAP Interface. }, 'References' => [ diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb index 8b09e14a0a..42fc8fa45b 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_brute_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console Brute Force', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to brute force the username | password for the SAP Management Console SOAP Interface. By diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb index 8e8fec1e8c..c653986490 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_extractusers.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console Extract Users', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to extract SAP users from the ABAP Syslog through the SAP Management Console SOAP Interface. diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb index 02ab323839..5590d96d0f 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getaccesspoints.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console Get Access Points', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to output a list of SAP access points through the SAP Management Console SOAP Interface. diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb index 45e07bef1b..269bd94a27 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getenv.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console getEnvironment', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to identify SAP Environment settings through the SAP Management Console SOAP Interface. diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb index 4be9c8d3a3..2ef53e8aa4 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getlogfiles.rb @@ -16,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console Get Logfile', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to download available logfiles and developer tracefiles through the SAP Management Console SOAP diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb index c09b0f87b9..d59c371a8d 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_getprocessparameter.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console Get Process Parameters', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to output a SAP process parameters and configuration settings through the SAP Management Console SOAP Interface. diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_instanceproperties.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_instanceproperties.rb index 87c27bc3c6..af99ca752b 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_instanceproperties.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_instanceproperties.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console Instance Properties', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to identify the instance properties through the SAP Management Console SOAP Interface. diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb index 261da9b14a..8a9d437fe5 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_listlogfiles.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console List Logfiles', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to output a list of available logfiles and developer tracefiles through the SAP Management diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb index 1a3655af32..b33efab603 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_startprofile.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console getStartProfile', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to acces the SAP startup profile through the SAP Management Console SOAP Interface. diff --git a/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb b/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb index 11a8367c7f..775034b114 100644 --- a/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb +++ b/modules/auxiliary/scanner/sap/sap_mgmt_con_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary def initialize super( 'Name' => 'SAP Management Console Version Detection', - 'Version' => '$Revision$', 'Description' => %q{ This module simply attempts to identify the version of SAP through the SAP Management Console SOAP Interface. diff --git a/modules/auxiliary/scanner/scada/digi_addp_reboot.rb b/modules/auxiliary/scanner/scada/digi_addp_reboot.rb index d41b17fb0b..41bead609f 100644 --- a/modules/auxiliary/scanner/scada/digi_addp_reboot.rb +++ b/modules/auxiliary/scanner/scada/digi_addp_reboot.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Digi ADDP Remote Reboot Initiator', - 'Version' => '$Revision$', 'Description' => 'Reboot Digi International based equipment through the ADDP service', 'Author' => 'hdm', 'References' => diff --git a/modules/auxiliary/scanner/scada/digi_addp_version.rb b/modules/auxiliary/scanner/scada/digi_addp_version.rb index 83687167c4..07944f3b46 100644 --- a/modules/auxiliary/scanner/scada/digi_addp_version.rb +++ b/modules/auxiliary/scanner/scada/digi_addp_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Digi ADDP Information Discovery', - 'Version' => '$Revision$', 'Description' => 'Discover host information through the Digi International ADDP service', 'Author' => 'hdm', 'References' => diff --git a/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb b/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb index d713af29e5..e6d6f4e7b8 100644 --- a/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb +++ b/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/scanner/scada/digi_realport_version.rb b/modules/auxiliary/scanner/scada/digi_realport_version.rb index 9860efe614..3d03b2ebb3 100644 --- a/modules/auxiliary/scanner/scada/digi_realport_version.rb +++ b/modules/auxiliary/scanner/scada/digi_realport_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/scanner/scada/koyo_login.rb b/modules/auxiliary/scanner/scada/koyo_login.rb index 1cda561fe9..7a990a3411 100644 --- a/modules/auxiliary/scanner/scada/koyo_login.rb +++ b/modules/auxiliary/scanner/scada/koyo_login.rb @@ -19,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Koyo DirectLogic PLC Password Brute Force Utility', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to authenticate to a locked Koyo DirectLogic PLC. The PLC uses a restrictive passcode, which can be A0000000 through A9999999. diff --git a/modules/auxiliary/scanner/sip/enumerator.rb b/modules/auxiliary/scanner/sip/enumerator.rb index 610f9fc359..9c472c374e 100644 --- a/modules/auxiliary/scanner/sip/enumerator.rb +++ b/modules/auxiliary/scanner/sip/enumerator.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SIP Username Enumerator (UDP)', - 'Version' => '$Revision$', 'Description' => 'Scan for numeric username/extensions using OPTIONS/REGISTER requests', 'Author' => 'et', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/sip/enumerator_tcp.rb b/modules/auxiliary/scanner/sip/enumerator_tcp.rb index 7a7d8df0f6..ef5a6d53b9 100644 --- a/modules/auxiliary/scanner/sip/enumerator_tcp.rb +++ b/modules/auxiliary/scanner/sip/enumerator_tcp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SIP Username Enumerator (TCP)', - 'Version' => '$Revision$', 'Description' => 'Scan for numeric username/extensions using OPTIONS/REGISTER requests', 'Author' => 'et', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/sip/options.rb b/modules/auxiliary/scanner/sip/options.rb index 977121dd4a..a81df328b2 100644 --- a/modules/auxiliary/scanner/sip/options.rb +++ b/modules/auxiliary/scanner/sip/options.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SIP Endpoint Scanner (UDP)', - 'Version' => '$Revision$', 'Description' => 'Scan for SIP devices using OPTIONS requests', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/sip/options_tcp.rb b/modules/auxiliary/scanner/sip/options_tcp.rb index d505f561c8..07765fe8fa 100644 --- a/modules/auxiliary/scanner/sip/options_tcp.rb +++ b/modules/auxiliary/scanner/sip/options_tcp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SIP Endpoint Scanner (TCP)', - 'Version' => '$Revision$', 'Description' => 'Scan for SIP devices using OPTIONS requests', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/sip/sipdroid_ext_enum.rb b/modules/auxiliary/scanner/sip/sipdroid_ext_enum.rb index eea9e98784..35578201a7 100644 --- a/modules/auxiliary/scanner/sip/sipdroid_ext_enum.rb +++ b/modules/auxiliary/scanner/sip/sipdroid_ext_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary (other versions may be affected). }, 'Author' => 'Anibal Aguiar ', - 'Version' => '$Revision$', 'References' => [ ['BID', '47710'], diff --git a/modules/auxiliary/scanner/smb/pipe_auditor.rb b/modules/auxiliary/scanner/smb/pipe_auditor.rb index 0fe359de19..560acd4cbc 100644 --- a/modules/auxiliary/scanner/smb/pipe_auditor.rb +++ b/modules/auxiliary/scanner/smb/pipe_auditor.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB Session Pipe Auditor', - 'Version' => '$Revision$', 'Description' => 'Determine what named pipes are accessible over SMB', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/smb/pipe_dcerpc_auditor.rb b/modules/auxiliary/scanner/smb/pipe_dcerpc_auditor.rb index f0b5260920..cdb1b4f495 100644 --- a/modules/auxiliary/scanner/smb/pipe_dcerpc_auditor.rb +++ b/modules/auxiliary/scanner/smb/pipe_dcerpc_auditor.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB Session Pipe DCERPC Auditor', - 'Version' => '$Revision$', 'Description' => 'Determine what DCERPC services are accessible over a SMB pipe', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/smb/smb2.rb b/modules/auxiliary/scanner/smb/smb2.rb index 77a7cc21a8..b3138b8d75 100644 --- a/modules/auxiliary/scanner/smb/smb2.rb +++ b/modules/auxiliary/scanner/smb/smb2.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB 2.0 Protocol Detection', - 'Version' => '$Revision$', 'Description' => 'Detect systems that support the SMB 2.0 protocol', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/smb/smb_enumshares.rb b/modules/auxiliary/scanner/smb/smb_enumshares.rb index cdfbeb419a..1e29ff153e 100644 --- a/modules/auxiliary/scanner/smb/smb_enumshares.rb +++ b/modules/auxiliary/scanner/smb/smb_enumshares.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB Share Enumeration', - 'Version' => '$Revision$', 'Description' => 'Determine what shares are provided by the SMB service', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/smb/smb_enumusers.rb b/modules/auxiliary/scanner/smb/smb_enumusers.rb index 520e2deb99..f63fe57a1f 100644 --- a/modules/auxiliary/scanner/smb/smb_enumusers.rb +++ b/modules/auxiliary/scanner/smb/smb_enumusers.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB User Enumeration (SAM EnumUsers)', - 'Version' => '$Revision$', 'Description' => 'Determine what local users exist via the SAM RPC service', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/smb/smb_enumusers_domain.rb b/modules/auxiliary/scanner/smb/smb_enumusers_domain.rb index 0582b2626e..dc6124a9c1 100644 --- a/modules/auxiliary/scanner/smb/smb_enumusers_domain.rb +++ b/modules/auxiliary/scanner/smb/smb_enumusers_domain.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary 'Version' => '$Revision $', 'Description' => 'Determine what domain users are logged into a remote system via a DCERPC to NetWkstaUserEnum.', 'Author' => 'natron', - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://msdn.microsoft.com/en-us/library/aa370669%28VS.85%29.aspx' ] diff --git a/modules/auxiliary/scanner/smb/smb_lookupsid.rb b/modules/auxiliary/scanner/smb/smb_lookupsid.rb index 2168e91585..8ffe83a4bb 100644 --- a/modules/auxiliary/scanner/smb/smb_lookupsid.rb +++ b/modules/auxiliary/scanner/smb/smb_lookupsid.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB Local User Enumeration (LookupSid)', - 'Version' => '$Revision$', 'Description' => 'Determine what local users exist via brute force SID lookups', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/smb/smb_version.rb b/modules/auxiliary/scanner/smb/smb_version.rb index fbb770395d..13bf28c281 100644 --- a/modules/auxiliary/scanner/smb/smb_version.rb +++ b/modules/auxiliary/scanner/smb/smb_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -34,7 +30,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMB Version Detection', - 'Version' => '$Revision$', 'Description' => 'Display version information about each system', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/smtp/smtp_enum.rb b/modules/auxiliary/scanner/smtp/smtp_enum.rb index 2766795f0a..f8ca9137e9 100644 --- a/modules/auxiliary/scanner/smtp/smtp_enum.rb +++ b/modules/auxiliary/scanner/smtp/smtp_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMTP User Enumeration Utility', - 'Version' => '$Revision$', 'Description' => %q{ The SMTP service has two internal commands that allow the enumeration of users: VRFY (confirming the names of valid users) and EXPN (which diff --git a/modules/auxiliary/scanner/smtp/smtp_version.rb b/modules/auxiliary/scanner/smtp/smtp_version.rb index a44bd07643..70f5a7cde9 100644 --- a/modules/auxiliary/scanner/smtp/smtp_version.rb +++ b/modules/auxiliary/scanner/smtp/smtp_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SMTP Banner Grabber', - 'Version' => '$Revision$', 'Description' => 'SMTP Banner Grabber', 'References' => [ diff --git a/modules/auxiliary/scanner/snmp/aix_version.rb b/modules/auxiliary/scanner/snmp/aix_version.rb index 2933987069..8319b87a01 100644 --- a/modules/auxiliary/scanner/snmp/aix_version.rb +++ b/modules/auxiliary/scanner/snmp/aix_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'AIX SNMP Scanner Auxiliary Module', - 'Version' => '$Revision$', 'Description' => 'AIX SNMP Scanner Auxiliary Module', 'Author' => [ diff --git a/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb b/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb index 5570362b2c..b565f7b995 100644 --- a/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb +++ b/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Cisco IOS SNMP Configuration Grabber (TFTP)', - 'Version' => '$Revision$', 'Description' => %q{ This module will download the startup or running configuration from a Cisco IOS device using SNMP and TFTP. A read-write SNMP diff --git a/modules/auxiliary/scanner/snmp/cisco_upload_file.rb b/modules/auxiliary/scanner/snmp/cisco_upload_file.rb index 631b1f2cd9..c9bb1716bf 100644 --- a/modules/auxiliary/scanner/snmp/cisco_upload_file.rb +++ b/modules/auxiliary/scanner/snmp/cisco_upload_file.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Cisco IOS SNMP File Upload (TFTP)', - 'Version' => '$Revision$', 'Description' => %q{ This module will copy file to a Cisco IOS device using SNMP and TFTP. A read-write SNMP community is required. The SNMP community scanner module can diff --git a/modules/auxiliary/scanner/snmp/snmp_enum.rb b/modules/auxiliary/scanner/snmp/snmp_enum.rb index ec10c11ecd..7db3f6190d 100644 --- a/modules/auxiliary/scanner/snmp/snmp_enum.rb +++ b/modules/auxiliary/scanner/snmp/snmp_enum.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'SNMP Enumeration Module', - 'Version' => '$Revision$', 'Description' => 'This module allows enumeration of any devices with SNMP protocol support. It supports hardware, software, and network information. The default community used is "public".', diff --git a/modules/auxiliary/scanner/snmp/snmp_enumshares.rb b/modules/auxiliary/scanner/snmp/snmp_enumshares.rb index 183710d530..1fe6a610e8 100644 --- a/modules/auxiliary/scanner/snmp/snmp_enumshares.rb +++ b/modules/auxiliary/scanner/snmp/snmp_enumshares.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SNMP Windows SMB Share Enumeration', - 'Version' => '$Revision$', 'Description' => "This module will use LanManager OID values to enumerate SMB shares on a Windows system via SNMP", 'Author' => ['tebo[at]attackresearch.com'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/snmp/snmp_enumusers.rb b/modules/auxiliary/scanner/snmp/snmp_enumusers.rb index 0ce4d6caf8..1d1c38fa14 100644 --- a/modules/auxiliary/scanner/snmp/snmp_enumusers.rb +++ b/modules/auxiliary/scanner/snmp/snmp_enumusers.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SNMP Windows Username Enumeration', - 'Version' => '$Revision$', 'Description' => "This module will use LanManager OID values to enumerate local user accounts on a Windows system via SNMP", 'Author' => ['tebo[at]attackresearch.com'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/snmp/snmp_login.rb b/modules/auxiliary/scanner/snmp/snmp_login.rb index b3982fb559..84cbc9f4c0 100644 --- a/modules/auxiliary/scanner/snmp/snmp_login.rb +++ b/modules/auxiliary/scanner/snmp/snmp_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SNMP Community Scanner', - 'Version' => '$Revision$', 'Description' => 'Scan for SNMP devices using common community names', 'Author' => 'hdm', 'References' => diff --git a/modules/auxiliary/scanner/snmp/snmp_set.rb b/modules/auxiliary/scanner/snmp/snmp_set.rb index 7ba24efd46..668e0264cf 100644 --- a/modules/auxiliary/scanner/snmp/snmp_set.rb +++ b/modules/auxiliary/scanner/snmp/snmp_set.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'SNMP Set Module', - 'Version' => '$Revision$', 'Description' => %q{ This module, similar to snmpset tool, uses the SNMP SET request to set information on a network entity. A OID (numeric notation) diff --git a/modules/auxiliary/scanner/snmp/xerox_workcentre_enumusers.rb b/modules/auxiliary/scanner/snmp/xerox_workcentre_enumusers.rb index ab1779dc63..d2c1eb71af 100644 --- a/modules/auxiliary/scanner/snmp/xerox_workcentre_enumusers.rb +++ b/modules/auxiliary/scanner/snmp/xerox_workcentre_enumusers.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Xerox WorkCentre User Enumeration (SNMP)', - 'Version' => '$Revision$', 'Description' => %q{ This module will do user enumeration based on the Xerox WorkCentre present on the network. SNMP is used to extract the usernames. diff --git a/modules/auxiliary/scanner/ssh/ssh_login.rb b/modules/auxiliary/scanner/ssh/ssh_login.rb index 1d163d716f..b65aeeb166 100644 --- a/modules/auxiliary/scanner/ssh/ssh_login.rb +++ b/modules/auxiliary/scanner/ssh/ssh_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SSH Login Check Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test ssh logins on a range of machines and report successful logins. If you have loaded a database plugin diff --git a/modules/auxiliary/scanner/ssh/ssh_login_pubkey.rb b/modules/auxiliary/scanner/ssh/ssh_login_pubkey.rb index 47c12693fa..14a4c1ef97 100644 --- a/modules/auxiliary/scanner/ssh/ssh_login_pubkey.rb +++ b/modules/auxiliary/scanner/ssh/ssh_login_pubkey.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SSH Public Key Login Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test ssh logins on a range of machines using a defined private key file, and report successful logins. diff --git a/modules/auxiliary/scanner/ssh/ssh_version.rb b/modules/auxiliary/scanner/ssh/ssh_version.rb index e3fc88514f..4a5edaeed9 100644 --- a/modules/auxiliary/scanner/ssh/ssh_version.rb +++ b/modules/auxiliary/scanner/ssh/ssh_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SSH Version Scanner', - 'Version' => '$Revision$', 'Description' => 'Detect SSH Version.', 'References' => [ diff --git a/modules/auxiliary/scanner/telephony/wardial.rb b/modules/auxiliary/scanner/telephony/wardial.rb index 95aeca87d8..ebff3dbf6d 100644 --- a/modules/auxiliary/scanner/telephony/wardial.rb +++ b/modules/auxiliary/scanner/telephony/wardial.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -48,7 +44,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Wardialer', - 'Version' => '$Revision$', 'Description' => 'Scan for dial-up systems that are connected to modems and answer telephony indials.', 'Author' => [ 'I)ruid' ], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/telnet/lantronix_telnet_version.rb b/modules/auxiliary/scanner/telnet/lantronix_telnet_version.rb index 44d0dd0f15..91d330692a 100644 --- a/modules/auxiliary/scanner/telnet/lantronix_telnet_version.rb +++ b/modules/auxiliary/scanner/telnet/lantronix_telnet_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Lantronix Telnet Service Banner Detection', - 'Version' => '$Revision$', 'Description' => 'Detect Lantronix telnet services', 'Author' => ['theLightCosine', 'hdm'], 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/telnet/telnet_encrypt_overflow.rb b/modules/auxiliary/scanner/telnet/telnet_encrypt_overflow.rb index 77741cee0d..1495624749 100644 --- a/modules/auxiliary/scanner/telnet/telnet_encrypt_overflow.rb +++ b/modules/auxiliary/scanner/telnet/telnet_encrypt_overflow.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Telnet Service Encyption Key ID Overflow Detection', - 'Version' => '$Revision$', 'Description' => 'Detect telnet services vulnerable to the encrypt option Key ID overflow (BSD-derived telnetd)', 'Author' => [ 'Jaime Penalba Estebanez ', 'hdm' ], 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/telnet/telnet_login.rb b/modules/auxiliary/scanner/telnet/telnet_login.rb index e76bd1a163..0d513e9654 100644 --- a/modules/auxiliary/scanner/telnet/telnet_login.rb +++ b/modules/auxiliary/scanner/telnet/telnet_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Telnet Login Check Scanner', - #'Version' => '$Revision$', + # 'Description' => %q{ This module will test a telnet login on a range of machines and report successful logins. If you have loaded a database plugin diff --git a/modules/auxiliary/scanner/telnet/telnet_version.rb b/modules/auxiliary/scanner/telnet/telnet_version.rb index 2682c02699..b24fdb8e4e 100644 --- a/modules/auxiliary/scanner/telnet/telnet_version.rb +++ b/modules/auxiliary/scanner/telnet/telnet_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Telnet Service Banner Detection', - 'Version' => '$Revision$', 'Description' => 'Detect telnet services', 'Author' => 'hdm', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/tftp/tftpbrute.rb b/modules/auxiliary/scanner/tftp/tftpbrute.rb index 99cfba7582..489859d8f6 100644 --- a/modules/auxiliary/scanner/tftp/tftpbrute.rb +++ b/modules/auxiliary/scanner/tftp/tftpbrute.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary 'Name' => 'TFTP Brute Forcer', 'Description' => 'This module uses a dictionary to brute force valid TFTP image names from a TFTP server.', 'Author' => 'antoine', - 'Version' => '$Revision$', 'License' => BSD_LICENSE ) diff --git a/modules/auxiliary/scanner/upnp/ssdp_msearch.rb b/modules/auxiliary/scanner/upnp/ssdp_msearch.rb index 2d7d761d5f..4f182bf6b3 100644 --- a/modules/auxiliary/scanner/upnp/ssdp_msearch.rb +++ b/modules/auxiliary/scanner/upnp/ssdp_msearch.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'UPnP SSDP M-SEARCH Information Discovery', - 'Version' => '$Revision$', 'Description' => 'Discover information from UPnP-enabled systems', 'Author' => 'todb', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/scanner/vmware/esx_fingerprint.rb b/modules/auxiliary/scanner/vmware/esx_fingerprint.rb index fd758794d5..2d7c8c8d67 100644 --- a/modules/auxiliary/scanner/vmware/esx_fingerprint.rb +++ b/modules/auxiliary/scanner/vmware/esx_fingerprint.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare ESX/ESXi Fingerprint Scanner', - 'Version' => '$Revision$', 'Description' => %Q{ This module accesses the web API interfaces for VMware ESX/ESXi servers and attempts to identify version information for that server. diff --git a/modules/auxiliary/scanner/vmware/vmauthd_login.rb b/modules/auxiliary/scanner/vmware/vmauthd_login.rb index 0a2cc08984..9a262b9478 100644 --- a/modules/auxiliary/scanner/vmware/vmauthd_login.rb +++ b/modules/auxiliary/scanner/vmware/vmauthd_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Authentication Daemon Login Scanner', - 'Version' => '$Revision$', 'Description' => %q{This module will test vmauthd logins on a range of machines and report successful logins. }, diff --git a/modules/auxiliary/scanner/vmware/vmauthd_version.rb b/modules/auxiliary/scanner/vmware/vmauthd_version.rb index 7db383ae18..0c842b578f 100644 --- a/modules/auxiliary/scanner/vmware/vmauthd_version.rb +++ b/modules/auxiliary/scanner/vmware/vmauthd_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Authentication Daemon Version Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will identify information about a host through the vmauthd service. diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb b/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb index 569dcc560f..8815bce4c4 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Enumerate Permissions', - 'Version' => '$Revision$', 'Description' => %Q{ This module will log into the Web API of VMWare and try to enumerate all the user/group permissions. Unlike enum suers this is only diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb b/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb index 025d137770..8e1021578d 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Enumerate Active Sessions', - 'Version' => '$Revision$', 'Description' => %Q{ This module will log into the Web API of VMWare and try to enumerate all the login sessions. diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_users.rb b/modules/auxiliary/scanner/vmware/vmware_enum_users.rb index 54f626c2ac..700fb3f96a 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_users.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_users.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Enumerate User Accounts', - 'Version' => '$Revision$', 'Description' => %Q{ This module will log into the Web API of VMWare and try to enumerate all the user accounts. If the VMware instance is connected to one or diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb b/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb index 948821801c..175571e14c 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/scanner/vmware/vmware_host_details.rb b/modules/auxiliary/scanner/vmware/vmware_host_details.rb index 164965300b..5bf6a1fbcc 100644 --- a/modules/auxiliary/scanner/vmware/vmware_host_details.rb +++ b/modules/auxiliary/scanner/vmware/vmware_host_details.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Enumerate Host Details', - 'Version' => '$Revision$', 'Description' => %Q{ This module attempts to enumerate information about the host systems through the VMWare web API. This can include information about the hardware installed on the host machine. diff --git a/modules/auxiliary/scanner/vmware/vmware_http_login.rb b/modules/auxiliary/scanner/vmware/vmware_http_login.rb index e2beb0247f..ab2bbe2892 100644 --- a/modules/auxiliary/scanner/vmware/vmware_http_login.rb +++ b/modules/auxiliary/scanner/vmware/vmware_http_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Web Login Scanner', - 'Version' => '$Revision$', 'Description' => 'This module attempts to authenticate to the VMWare HTTP service for VmWare Server, ESX, and ESXI', 'Author' => ['theLightCosine'], diff --git a/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb b/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb index ae403685ce..face2be067 100644 --- a/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb +++ b/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VMWare Screenshot Stealer', - 'Version' => '$Revision$', 'Description' => %Q{ This module uses supplied login credentials to connect to VMWare via the web interface. It then searches through the datastores looking for screenshots. diff --git a/modules/auxiliary/scanner/vnc/vnc_login.rb b/modules/auxiliary/scanner/vnc/vnc_login.rb index 3a3b2c0889..3a710d2e90 100644 --- a/modules/auxiliary/scanner/vnc/vnc_login.rb +++ b/modules/auxiliary/scanner/vnc/vnc_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VNC Authentication Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module will test a VNC server on a range of machines and report successful logins. Currently it supports RFB protocol diff --git a/modules/auxiliary/scanner/vnc/vnc_none_auth.rb b/modules/auxiliary/scanner/vnc/vnc_none_auth.rb index 3de1c52f95..acbc46b9d2 100644 --- a/modules/auxiliary/scanner/vnc/vnc_none_auth.rb +++ b/modules/auxiliary/scanner/vnc/vnc_none_auth.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VNC Authentication None Detection', - 'Version' => '$Revision$', 'Description' => 'Detect VNC servers that support the "None" authentication method.', 'References' => [ diff --git a/modules/auxiliary/scanner/voice/recorder.rb b/modules/auxiliary/scanner/voice/recorder.rb index 084be064b5..c3472d1640 100644 --- a/modules/auxiliary/scanner/voice/recorder.rb +++ b/modules/auxiliary/scanner/voice/recorder.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Telephone Line Voice Scanner', - 'Version' => '$Revision$', 'Description' => 'This module dials a range of phone numbers and records audio from each answered call', 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb b/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb index 7f57f34724..c9b67caf0d 100644 --- a/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb +++ b/modules/auxiliary/scanner/vxworks/wdbrpc_bootline.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VxWorks WDB Agent Boot Parameter Scanner', - 'Version' => '$Revision$', 'Description' => 'Scan for exposed VxWorks wdbrpc daemons and dump the boot parameters from memory', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb b/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb index d8d9dbc8c9..7427a46f28 100644 --- a/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb +++ b/modules/auxiliary/scanner/vxworks/wdbrpc_version.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VxWorks WDB Agent Version Scanner', - 'Version' => '$Revision$', 'Description' => 'Scan for exposed VxWorks wdbrpc daemons', 'Author' => 'hdm', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/scanner/winrm/winrm_auth_methods.rb b/modules/auxiliary/scanner/winrm/winrm_auth_methods.rb index d0b583a549..7075db1147 100644 --- a/modules/auxiliary/scanner/winrm/winrm_auth_methods.rb +++ b/modules/auxiliary/scanner/winrm/winrm_auth_methods.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'WinRM Authentication Method Detection', - 'Version' => '$Revision$', 'Description' => %q{ This module sends a request to an HTTP/HTTPS service to see if it is a WinRM service. If it is a WinRM service, it also gathers the Authentication Methods supported. diff --git a/modules/auxiliary/scanner/winrm/winrm_cmd.rb b/modules/auxiliary/scanner/winrm/winrm_cmd.rb index a4a4dcc6b1..12f0c70422 100644 --- a/modules/auxiliary/scanner/winrm/winrm_cmd.rb +++ b/modules/auxiliary/scanner/winrm/winrm_cmd.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit diff --git a/modules/auxiliary/scanner/winrm/winrm_login.rb b/modules/auxiliary/scanner/winrm/winrm_login.rb index 5c516f9282..d8012fb723 100644 --- a/modules/auxiliary/scanner/winrm/winrm_login.rb +++ b/modules/auxiliary/scanner/winrm/winrm_login.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'WinRM Login Utility', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to authenticate to a WinRM service. It currently works only if the remote end allows Negotiate(NTLM) authentication. diff --git a/modules/auxiliary/scanner/winrm/winrm_wql.rb b/modules/auxiliary/scanner/winrm/winrm_wql.rb index c93865bb3d..ed09cfd583 100644 --- a/modules/auxiliary/scanner/winrm/winrm_wql.rb +++ b/modules/auxiliary/scanner/winrm/winrm_wql.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'WinRM WQL Query Runner', - 'Version' => '$Revision$', 'Description' => %q{ This module runs WQL queries against remote WinRM Services. Authentication is required. Currently only works with NTLM auth. diff --git a/modules/auxiliary/scanner/x11/open_x11.rb b/modules/auxiliary/scanner/x11/open_x11.rb index a271b64563..0de53e014a 100644 --- a/modules/auxiliary/scanner/x11/open_x11.rb +++ b/modules/auxiliary/scanner/x11/open_x11.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'X11 No-Auth Scanner', - 'Version' => '$Revision$', 'Description' => %q{ This module scans for X11 servers that allow anyone to connect without authentication. diff --git a/modules/auxiliary/server/browser_autopwn.rb b/modules/auxiliary/server/browser_autopwn.rb index c448b42865..cd8e1a0274 100644 --- a/modules/auxiliary/server/browser_autopwn.rb +++ b/modules/auxiliary/server/browser_autopwn.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'HTTP Client Automatic Exploiter', - 'Version' => '$Revision$', 'Description' => %q{ This module has three actions. The first (and the default) is 'WebServer' which uses a combination of client-side and diff --git a/modules/auxiliary/server/capture/drda.rb b/modules/auxiliary/server/capture/drda.rb index b71f9f1ce8..2072b8545b 100644 --- a/modules/auxiliary/server/capture/drda.rb +++ b/modules/auxiliary/server/capture/drda.rb @@ -38,7 +38,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: DRDA (DB2, Informix, Derby)', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake DRDA (DB2, Informix, Derby) server that is designed to capture authentication credentials. diff --git a/modules/auxiliary/server/capture/ftp.rb b/modules/auxiliary/server/capture/ftp.rb index 822108e56c..e0fcce9aed 100644 --- a/modules/auxiliary/server/capture/ftp.rb +++ b/modules/auxiliary/server/capture/ftp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: FTP', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake FTP service that is designed to capture authentication credentials. diff --git a/modules/auxiliary/server/capture/http.rb b/modules/auxiliary/server/capture/http.rb index c514d5e873..90c48a9c56 100644 --- a/modules/auxiliary/server/capture/http.rb +++ b/modules/auxiliary/server/capture/http.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: HTTP', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake HTTP service that is designed to capture authentication credentials. diff --git a/modules/auxiliary/server/capture/http_ntlm.rb b/modules/auxiliary/server/capture/http_ntlm.rb index 37600f2a6f..0cf8e81bed 100644 --- a/modules/auxiliary/server/capture/http_ntlm.rb +++ b/modules/auxiliary/server/capture/http_ntlm.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'HTTP Client MS Credential Catcher', - 'Version' => '$Revision$', 'Description' => %q{ This module attempts to quietly catch NTLM/LM Challenge hashes. }, @@ -35,7 +30,6 @@ class Metasploit3 < Msf::Auxiliary [ 'Ryan Linn ', ], - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'Actions' => [ diff --git a/modules/auxiliary/server/capture/imap.rb b/modules/auxiliary/server/capture/imap.rb index 7111cbc4a7..8b0df65051 100644 --- a/modules/auxiliary/server/capture/imap.rb +++ b/modules/auxiliary/server/capture/imap.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: IMAP', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake IMAP service that is designed to capture authentication credentials. diff --git a/modules/auxiliary/server/capture/mysql.rb b/modules/auxiliary/server/capture/mysql.rb index dba3449c76..83a21919ff 100644 --- a/modules/auxiliary/server/capture/mysql.rb +++ b/modules/auxiliary/server/capture/mysql.rb @@ -15,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: MySQL', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake MySQL service that is designed to capture authentication credentials. It captures challenge and diff --git a/modules/auxiliary/server/capture/pop3.rb b/modules/auxiliary/server/capture/pop3.rb index d7ebca54e0..a967fe082d 100644 --- a/modules/auxiliary/server/capture/pop3.rb +++ b/modules/auxiliary/server/capture/pop3.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: POP3', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake POP3 service that is designed to capture authentication credentials. diff --git a/modules/auxiliary/server/capture/printjob_capture.rb b/modules/auxiliary/server/capture/printjob_capture.rb index eb64780bfa..198b38de7e 100644 --- a/modules/auxiliary/server/capture/printjob_capture.rb +++ b/modules/auxiliary/server/capture/printjob_capture.rb @@ -16,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Printjob Capture Service', - 'Version' => '$Revision$', 'Description' => %q{ This module is designed to listen for PJL or PostScript print jobs. Once a print job is detected it is saved to loot. The diff --git a/modules/auxiliary/server/capture/sip.rb b/modules/auxiliary/server/capture/sip.rb index 0ddd78c71f..4ca4a8f310 100644 --- a/modules/auxiliary/server/capture/sip.rb +++ b/modules/auxiliary/server/capture/sip.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: SIP', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake SIP service that is designed to capture authentication credentials. It captures challenge and diff --git a/modules/auxiliary/server/capture/smb.rb b/modules/auxiliary/server/capture/smb.rb index 577b87e541..24f67d9121 100644 --- a/modules/auxiliary/server/capture/smb.rb +++ b/modules/auxiliary/server/capture/smb.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: SMB', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a SMB service that can be used to capture the challenge-response password hashes of SMB client diff --git a/modules/auxiliary/server/capture/smtp.rb b/modules/auxiliary/server/capture/smtp.rb index bb708d6b18..500feec68b 100644 --- a/modules/auxiliary/server/capture/smtp.rb +++ b/modules/auxiliary/server/capture/smtp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: SMTP', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake SMTP service that is designed to capture authentication credentials. diff --git a/modules/auxiliary/server/capture/telnet.rb b/modules/auxiliary/server/capture/telnet.rb index 143735d23e..317feea516 100644 --- a/modules/auxiliary/server/capture/telnet.rb +++ b/modules/auxiliary/server/capture/telnet.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Authentication Capture: Telnet', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a fake Telnet service that is designed to capture authentication credentials. DONTs diff --git a/modules/auxiliary/server/dhcp.rb b/modules/auxiliary/server/dhcp.rb index 8d1f7229b9..b08a04aacf 100644 --- a/modules/auxiliary/server/dhcp.rb +++ b/modules/auxiliary/server/dhcp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DHCP Server', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a DHCP service }, diff --git a/modules/auxiliary/server/dns/spoofhelper.rb b/modules/auxiliary/server/dns/spoofhelper.rb index 4e18eb4a6b..cf5275988a 100644 --- a/modules/auxiliary/server/dns/spoofhelper.rb +++ b/modules/auxiliary/server/dns/spoofhelper.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DNS Spoofing Helper Service', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a DNS service that returns TXT records indicating information about the querying service. diff --git a/modules/auxiliary/server/fakedns.rb b/modules/auxiliary/server/fakedns.rb index 2f97f897eb..60bd62c9e8 100644 --- a/modules/auxiliary/server/fakedns.rb +++ b/modules/auxiliary/server/fakedns.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Fake DNS Service', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a DNS service that redirects all queries to a particular address. diff --git a/modules/auxiliary/server/ftp.rb b/modules/auxiliary/server/ftp.rb index 3e459175cb..31ae8e3dfc 100644 --- a/modules/auxiliary/server/ftp.rb +++ b/modules/auxiliary/server/ftp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'FTP File Server', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a FTP service }, diff --git a/modules/auxiliary/server/http_ntlmrelay.rb b/modules/auxiliary/server/http_ntlmrelay.rb index 2edb6392ec..97e530ecf4 100644 --- a/modules/auxiliary/server/http_ntlmrelay.rb +++ b/modules/auxiliary/server/http_ntlmrelay.rb @@ -35,7 +35,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, 'Name' => 'HTTP Client MS Credential Relayer', - 'Version' => '$Revision$', 'Description' => %q{ This module relays negotiated NTLM Credentials from an HTTP server to multiple protocols. Currently, this module supports relaying to SMB and HTTP. diff --git a/modules/auxiliary/server/pxexploit.rb b/modules/auxiliary/server/pxexploit.rb index 4ed4ca7aa8..ca46df566c 100644 --- a/modules/auxiliary/server/pxexploit.rb +++ b/modules/auxiliary/server/pxexploit.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'PXE Boot Exploit Server', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a PXE server, running a DHCP and TFTP server. The default configuration loads a linux kernel and initrd into memory that diff --git a/modules/auxiliary/server/socks4a.rb b/modules/auxiliary/server/socks4a.rb index 4d8fdeb902..92d4b9b6b1 100644 --- a/modules/auxiliary/server/socks4a.rb +++ b/modules/auxiliary/server/socks4a.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Socks4a Proxy Server', - 'Version' => '$Revision$', 'Description' => 'This module provides a socks4a proxy server that uses the builtin Metasploit routing to relay connections.', 'Author' => 'sf', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/server/socks_unc.rb b/modules/auxiliary/server/socks_unc.rb index de5891fd53..12369ba295 100644 --- a/modules/auxiliary/server/socks_unc.rb +++ b/modules/auxiliary/server/socks_unc.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'SOCKS Proxy UNC Path Redirection', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a Socks proxy service that redirects all HTTP requests to a web page that diff --git a/modules/auxiliary/server/tftp.rb b/modules/auxiliary/server/tftp.rb index f95dd7d4d4..c9b5f6724c 100644 --- a/modules/auxiliary/server/tftp.rb +++ b/modules/auxiliary/server/tftp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'TFTP File Server', - 'Version' => '$Revision$', 'Description' => %q{ This module provides a TFTP service }, diff --git a/modules/auxiliary/server/webkit_xslt_dropper.rb b/modules/auxiliary/server/webkit_xslt_dropper.rb index d7c1f7e69f..6d7bc9c2b5 100644 --- a/modules/auxiliary/server/webkit_xslt_dropper.rb +++ b/modules/auxiliary/server/webkit_xslt_dropper.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary C:\Program Files\ }, 'Author' => [ 'Nicolas Gregoire' ], - 'Version' => '$Revision$', 'License' => MSF_LICENSE, 'Actions' => [ diff --git a/modules/auxiliary/sniffer/psnuffle.rb b/modules/auxiliary/sniffer/psnuffle.rb index eebcd8643d..d8127e28f4 100644 --- a/modules/auxiliary/sniffer/psnuffle.rb +++ b/modules/auxiliary/sniffer/psnuffle.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'pSnuffle Packet Sniffer', - 'Version' => '$Revision$', 'Description' => 'This module sniffs passwords like dsniff did in the past', 'Author' => 'Max Moser ', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/spoof/arp/arp_poisoning.rb b/modules/auxiliary/spoof/arp/arp_poisoning.rb index 7fad7e6731..0cf36ddff6 100644 --- a/modules/auxiliary/spoof/arp/arp_poisoning.rb +++ b/modules/auxiliary/spoof/arp/arp_poisoning.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'ARP Spoof', - 'Version' => '$Revision$', 'Description' => %q{ Spoof ARP replies and poison remote ARP caches to conduct IP address spoofing or a denial of service. }, diff --git a/modules/auxiliary/spoof/cisco/dtp.rb b/modules/auxiliary/spoof/cisco/dtp.rb index 588495ce74..99f9f5f8cc 100644 --- a/modules/auxiliary/spoof/cisco/dtp.rb +++ b/modules/auxiliary/spoof/cisco/dtp.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -18,7 +14,6 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super( 'Name' => 'Forge Cisco DTP Packets', - 'Version' => '$Revision$', 'Description' => %q{ This module forges DTP packets to initialize a trunk port. }, diff --git a/modules/auxiliary/spoof/dns/bailiwicked_domain.rb b/modules/auxiliary/spoof/dns/bailiwicked_domain.rb index e5a842abde..2e7c20ba66 100644 --- a/modules/auxiliary/spoof/dns/bailiwicked_domain.rb +++ b/modules/auxiliary/spoof/dns/bailiwicked_domain.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -38,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary 'Cedric Blancher ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1447' ], diff --git a/modules/auxiliary/spoof/dns/bailiwicked_host.rb b/modules/auxiliary/spoof/dns/bailiwicked_host.rb index df60299919..b646e33607 100644 --- a/modules/auxiliary/spoof/dns/bailiwicked_host.rb +++ b/modules/auxiliary/spoof/dns/bailiwicked_host.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - require 'msf/core' require 'net/dns' require 'resolv' @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'I)ruid', 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1447' ], diff --git a/modules/auxiliary/spoof/dns/compare_results.rb b/modules/auxiliary/spoof/dns/compare_results.rb index a61385da27..c297dbd5b5 100644 --- a/modules/auxiliary/spoof/dns/compare_results.rb +++ b/modules/auxiliary/spoof/dns/compare_results.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'hdm' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ ], diff --git a/modules/auxiliary/spoof/nbns/nbns_response.rb b/modules/auxiliary/spoof/nbns/nbns_response.rb index 1ac2c4a7c7..9767bc4807 100644 --- a/modules/auxiliary/spoof/nbns/nbns_response.rb +++ b/modules/auxiliary/spoof/nbns/nbns_response.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Tim Medin ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.packetstan.com/2011/03/nbns-spoofing-on-your-way-to-world.html' ] diff --git a/modules/auxiliary/spoof/replay/pcap_replay.rb b/modules/auxiliary/spoof/replay/pcap_replay.rb index 5b3541b49c..f34b2d5ba4 100644 --- a/modules/auxiliary/spoof/replay/pcap_replay.rb +++ b/modules/auxiliary/spoof/replay/pcap_replay.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -18,7 +14,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Pcap Replay Utility', - 'Version' => '$Revision$', 'Description' => %q{ Replay a pcap capture file }, diff --git a/modules/auxiliary/spoof/wifi/airpwn.rb b/modules/auxiliary/spoof/wifi/airpwn.rb index 915d5dc5ae..b16474fcb9 100644 --- a/modules/auxiliary/spoof/wifi/airpwn.rb +++ b/modules/auxiliary/spoof/wifi/airpwn.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -21,7 +17,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'Airpwn TCP Hijack', - 'Version' => '$Revision$', 'Description' => %q{ TCP streams are 'protected' only in so much as the sequence number is not guessable. diff --git a/modules/auxiliary/spoof/wifi/dnspwn.rb b/modules/auxiliary/spoof/wifi/dnspwn.rb index 3fbc7ca8f4..61a68e5b5e 100644 --- a/modules/auxiliary/spoof/wifi/dnspwn.rb +++ b/modules/auxiliary/spoof/wifi/dnspwn.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'DNSpwn DNS Hijack', - 'Version' => '$Revision$', 'Description' => %q{ Race DNS responses and replace DNS queries }, diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb index 78cfb20f14..f6421601d3 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3996' ], diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb index eadbff66b5..5156e9099d 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3995' ], diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb index e4518a2e93..189e4de457 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0870' ], diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb index 982cf8a00e..597cf9eb19 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-2415' ], diff --git a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb index 2327ed1aed..2adc8ff236 100644 --- a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb +++ b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2006-2081' ], diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb index 81380d3a72..b927ed215c 100644 --- a/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb +++ b/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.metasploit.com' ], diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb index 585e9540a2..dca09dbefc 100644 --- a/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb +++ b/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.metasploit.com' ], diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb index 10a708726e..bf15b6e6b8 100644 --- a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb +++ b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.metasploit.com' ], diff --git a/modules/auxiliary/sqli/oracle/droptable_trigger.rb b/modules/auxiliary/sqli/oracle/droptable_trigger.rb index 171b57a99d..1850dd3021 100644 --- a/modules/auxiliary/sqli/oracle/droptable_trigger.rb +++ b/modules/auxiliary/sqli/oracle/droptable_trigger.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Sh2kerr ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3979' ], diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb index 3c230cca7d..3b858000ec 100644 --- a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb +++ b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'sid[at]notsosecure.com' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0866'], diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb index 0aed4857b6..723e2101dc 100644 --- a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb +++ b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'sid[at]notsosecure.com' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2010-0866'], diff --git a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb index 8de44140c3..06b4463732 100644 --- a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'CG' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3982'], diff --git a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb index 1de25f1a6c..baa82d5c57 100644 --- a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb +++ b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => ['CG'], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2007-5511'], diff --git a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb index 061e42beef..a1152ef368 100644 --- a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'CG' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3983'], diff --git a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb index 917851d2dd..1177f1f591 100644 --- a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'Sh2kerr ' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-3984' ], diff --git a/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb b/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb index 89cf84c236..68c8319599 100644 --- a/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, - 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2009-0978' ], diff --git a/modules/auxiliary/vsploit/malware/dns/dns_mariposa.rb b/modules/auxiliary/vsploit/malware/dns/dns_mariposa.rb index adc18b0953..016d1487f4 100644 --- a/modules/auxiliary/vsploit/malware/dns/dns_mariposa.rb +++ b/modules/auxiliary/vsploit/malware/dns/dns_mariposa.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -16,7 +12,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VSploit Mariposa DNS Query Module', - 'Version' => '$Revision$', 'Description' => 'This module queries known Mariposa Botnet DNS records.', 'Author' => 'MJC', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/vsploit/malware/dns/dns_query.rb b/modules/auxiliary/vsploit/malware/dns/dns_query.rb index 9b0f8823b2..08eb17597d 100644 --- a/modules/auxiliary/vsploit/malware/dns/dns_query.rb +++ b/modules/auxiliary/vsploit/malware/dns/dns_query.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # # This file is part of the Metasploit Framework and may be subject to @@ -17,7 +13,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VSploit DNS Beaconing Emulation', - 'Version' => '$Revision$', 'Description' => 'This module takes a list and emulates malicious DNS beaconing.', 'Author' => 'MJC', 'License' => MSF_LICENSE diff --git a/modules/auxiliary/vsploit/malware/dns/dns_zeus.rb b/modules/auxiliary/vsploit/malware/dns/dns_zeus.rb index 2648670df7..aef1be35e0 100644 --- a/modules/auxiliary/vsploit/malware/dns/dns_zeus.rb +++ b/modules/auxiliary/vsploit/malware/dns/dns_zeus.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -16,7 +12,6 @@ class Metasploit3 < Msf::Auxiliary def initialize super( 'Name' => 'VSploit Zeus DNS Query Module', - 'Version' => '$Revision$', 'Description' => 'This module queries known Zeus Botnet DNS records.', 'Author' => 'MJC', 'License' => MSF_LICENSE, diff --git a/modules/auxiliary/vsploit/pii/email_pii.rb b/modules/auxiliary/vsploit/pii/email_pii.rb index 8107c615b4..80773acd44 100644 --- a/modules/auxiliary/vsploit/pii/email_pii.rb +++ b/modules/auxiliary/vsploit/pii/email_pii.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -27,8 +23,7 @@ class Metasploit3 < Msf::Auxiliary should be flagged via an internal or external SMTP server. }, 'License' => MSF_LICENSE, - 'Author' => ['willis'], - 'Version' => '$Revision$' + 'Author' => ['willis'] )) register_options( [ diff --git a/modules/auxiliary/vsploit/pii/web_pii.rb b/modules/auxiliary/vsploit/pii/web_pii.rb index 7126189bb4..f424b34746 100644 --- a/modules/auxiliary/vsploit/pii/web_pii.rb +++ b/modules/auxiliary/vsploit/pii/web_pii.rb @@ -1,7 +1,3 @@ -## -# $Id$ -## - ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit @@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary 'Description' => 'This module emulates a webserver leaking PII data', 'License' => MSF_LICENSE, 'Author' => 'MJC', - 'Version' => '$Revision$', 'References' => [ [ 'URL', 'http://www.metasploit.com'], diff --git a/modules/exploits/windows/browser/ie_cbutton_uaf.rb b/modules/exploits/windows/browser/ie_cbutton_uaf.rb index 1b475a0e5b..8b36b5e4a2 100644 --- a/modules/exploits/windows/browser/ie_cbutton_uaf.rb +++ b/modules/exploits/windows/browser/ie_cbutton_uaf.rb @@ -12,6 +12,15 @@ class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::RopDb + include Msf::Exploit::Remote::BrowserAutopwn + autopwn_info({ + :ua_name => HttpClients::IE, + :ua_minver => "8.0", + :ua_maxver => "8.0", + :javascript => true, + :os_name => OperatingSystems::WINDOWS, + :rank => GoodRanking + }) def initialize(info={}) super(update_info(info,