Merge branch 'master' of github.com:rapid7/metasploit-framework

bug/bundler_fix
sinn3r 2013-01-03 17:49:24 -06:00
commit 38de5d63d8
451 changed files with 101 additions and 2228 deletions

View File

@ -676,6 +676,13 @@ class DBManager
sess_data[:desc] = sess_data[:desc][0,255] sess_data[:desc] = sess_data[:desc][0,255]
end end
# In the case of multi handler we cannot yet determine the true
# exploit responsible. But we can at least show the parent versus
# just the generic handler:
if session.via_exploit == "exploit/multi/handler"
sess_data[:via_exploit] = sess_data[:datastore]['ParentModule']
end
s = ::Mdm::Session.new(sess_data) s = ::Mdm::Session.new(sess_data)
s.save! s.save!
@ -684,19 +691,26 @@ class DBManager
end end
# If this is a live session, we know the host is vulnerable to something. # If this is a live session, we know the host is vulnerable to something.
# If the exploit used was multi/handler, though, we don't know what if opts[:session] and session.via_exploit
# it's vulnerable to, so it isn't really useful to save it.
if opts[:session] and session.via_exploit and session.via_exploit != "exploit/multi/handler"
return unless host return unless host
mod = framework.modules.create(session.via_exploit) mod = framework.modules.create(session.via_exploit)
if session.via_exploit == "exploit/multi/handler"
mod_fullname = sess_data[:datastore]['ParentModule']
mod_name = ::Mdm::ModuleDetail.find_by_fullname(mod_fullname).name
else
mod_name = mod.name
mod_fullname = mod.fullname
end
vuln_info = { vuln_info = {
:host => host.address, :host => host.address,
:name => mod.name, :name => mod_name,
:refs => mod.references, :refs => mod.references,
:workspace => wspace, :workspace => wspace,
:exploited_at => Time.now.utc, :exploited_at => Time.now.utc,
:info => "Exploited by #{mod.fullname} to create Session #{s.id}" :info => "Exploited by #{mod_fullname} to create Session #{s.id}"
} }
port = session.exploit_datastore["RPORT"] port = session.exploit_datastore["RPORT"]
@ -706,10 +720,15 @@ class DBManager
vuln = framework.db.report_vuln(vuln_info) vuln = framework.db.report_vuln(vuln_info)
if session.via_exploit == "exploit/multi/handler"
via_exploit = sess_data[:datastore]['ParentModule']
else
via_exploit = session.via_exploit
end
attempt_info = { attempt_info = {
:timestamp => Time.now.utc, :timestamp => Time.now.utc,
:workspace => wspace, :workspace => wspace,
:module => session.via_exploit, :module => via_exploit,
:username => session.username, :username => session.username,
:refs => mod.references, :refs => mod.references,
:session_id => s.id, :session_id => s.id,

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary
configuration changes (such as resetting the password) as administrators. configuration changes (such as resetting the password) as administrators.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => "$Revision$",
'Author' => 'Author' =>
[ [
'hkm [at] hakim.ws', #Initial discovery, poc 'hkm [at] hakim.ws', #Initial discovery, poc

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm', 'Unknown' ], 'Author' => [ 'hdm', 'Unknown' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['CVE', '2005-2611'], ['CVE', '2005-2611'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm' ], 'Author' => [ 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'OSVDB', '17627' ], [ 'OSVDB', '17627' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Cisco Secure ACS Version < 5.1.0.44.5 or 5.2.0.26.2 Unauthorized Password Change', 'Name' => 'Cisco Secure ACS Version < 5.1.0.44.5 or 5.2.0.26.2 Unauthorized Password Change',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module exploits an authentication bypass issue which allows arbitrary This module exploits an authentication bypass issue which allows arbitrary
password change requests to be issued for any user in the local store. password change requests to be issued for any user in the local store.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', '19680' ], [ 'BID', '19680' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2004-0795' ], [ 'CVE', '2004-0795' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary
['OSVDB', '60035'], ['OSVDB', '60035'],
], ],
'Author' => 'hdm', 'Author' => 'hdm',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE
'Version' => '$Revision$'
)) ))
register_options([ register_options([

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ], [ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ], [ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -34,7 +30,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => 'jduck', 'Author' => 'jduck',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'OSVDB', '65533'], [ 'OSVDB', '65533'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'ContentKeeper Web Appliance mimencode File Access', 'Name' => 'ContentKeeper Web Appliance mimencode File Access',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module abuses the 'mimencode' binary present within This module abuses the 'mimencode' binary present within
ContentKeeper Web filtering appliances to retrieve arbitrary ContentKeeper Web filtering appliances to retrieve arbitrary

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'OSVDB', '5798' ], [ 'OSVDB', '5798' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Iomega StorCenter Pro NAS Web Authentication Bypass', 'Name' => 'Iomega StorCenter Pro NAS Web Authentication Bypass',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
The Iomega StorCenter Pro Network Attached Storage device web interface increments sessions IDs, The Iomega StorCenter Pro Network Attached Storage device web interface increments sessions IDs,
allowing for simple brute force attacks to bypass authentication and gain administrative allowing for simple brute force attacks to bypass authentication and gain administrative

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Tomcat Administration Tool Default Access', 'Name' => 'Tomcat Administration Tool Default Access',
'Version' => '$Revision$',
'Description' => 'Detect the Tomcat administration interface.', 'Description' => 'Detect the Tomcat administration interface.',
'References' => 'References' =>
[ [

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability', 'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module tests whether a directory traversal vulnerablity is present This module tests whether a directory traversal vulnerablity is present
in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0 in versions of Apache Tomcat 4.1.0 - 4.1.37, 5.5.0 - 5.5.26 and 6.0.0

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal', 'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module tests whether a directory traversal vulnerablity is present This module tests whether a directory traversal vulnerablity is present
in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294. in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -19,7 +15,6 @@ class Metasploit4 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'TYPO3 sa-2009-001 Weak Encryption Key File Disclosure', 'Name' => 'TYPO3 sa-2009-001 Weak Encryption Key File Disclosure',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module exploits a flaw in TYPO3 encryption ey creation process to allow for This module exploits a flaw in TYPO3 encryption ey creation process to allow for
file disclosure in the jumpUrl mechanism. This flaw can be used to read any file file disclosure in the jumpUrl mechanism. This flaw can be used to read any file

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'spinbad <spinbad.security[at]googlemail.com>' ], 'Author' => [ 'spinbad <spinbad.security[at]googlemail.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '52048'], ['OSVDB', '52048'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'TYPO3 sa-2010-020 Remote File Disclosure', 'Name' => 'TYPO3 sa-2010-020 Remote File Disclosure',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module exploits a flaw in the way the TYPO3 jumpurl feature matches hashes. This module exploits a flaw in the way the TYPO3 jumpurl feature matches hashes.
Due to this flaw a Remote File Disclosure is possible by matching the juhash of 0. Due to this flaw a Remote File Disclosure is possible by matching the juhash of 0.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -19,7 +15,6 @@ class Metasploit4 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'TYPO3 Winstaller default Encryption Keys', 'Name' => 'TYPO3 Winstaller default Encryption Keys',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module exploits known default encryption keys found in the TYPO3 Winstaller. This module exploits known default encryption keys found in the TYPO3 Winstaller.
This flaw allows for file disclosure in the jumpUrl mechanism. This issue can be This flaw allows for file disclosure in the jumpUrl mechanism. This issue can be

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '40210' ], ['OSVDB', '40210' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => 'kris katterjohn', 'Author' => 'kris katterjohn',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => [ 'References' => [
[ 'CVE', '2004-1550' ], [ 'CVE', '2004-1550' ],
[ 'OSVDB', '10232' ], [ 'OSVDB', '10232' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'MSB', 'MS08-059' ], [ 'MSB', 'MS08-059' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
supplied. supplied.
}, },
'Author' => [ 'Carlos Perez <carlos_perez [at] darkoperator.com>' ], 'Author' => [ 'Carlos Perez <carlos_perez [at] darkoperator.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE
'Version' => '$Revision$'
)) ))
end end

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'tebo <tebo[at]attackresearch.com>' ], 'Author' => [ 'tebo <tebo[at]attackresearch.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://msdn.microsoft.com/en-us/library/cc448435(PROT.10).aspx'], [ 'URL', 'http://msdn.microsoft.com/en-us/library/cc448435(PROT.10).aspx'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# Author: Robin Wood <robin@digininja.org> <http://www.digininja.org> # Author: Robin Wood <robin@digininja.org> <http://www.digininja.org>
# Version: 0.1 # Version: 0.1
@ -38,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Robin Wood <robin[at]digininja.org>' ], 'Author' => [ 'Robin Wood <robin[at]digininja.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://www.digininja.org/metasploit/mssql_idf.php' ], [ 'URL', 'http://www.digininja.org/metasploit/mssql_idf.php' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'tebo <tebo [at] attackresearch [dot] com>' ], 'Author' => [ 'tebo <tebo [at] attackresearch [dot] com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://www.attackresearch.com' ], [ 'URL', 'http://www.attackresearch.com' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>' ], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'https://cisecurity.org/benchmarks.html' ] [ 'URL', 'https://cisecurity.org/benchmarks.html' ]

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,8 +21,7 @@ class Metasploit3 < Msf::Auxiliary
against a MySQL instance given the appropriate credentials. against a MySQL instance given the appropriate credentials.
}, },
'Author' => [ 'Bernardo Damele A. G. <bernardo.damele[at]gmail.com>' ], 'Author' => [ 'Bernardo Damele A. G. <bernardo.damele[at]gmail.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE
'Version' => '$Revision$'
)) ))
register_options( register_options(

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -19,7 +15,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'TrendMicro OfficeScanNT Listener Traversal Arbitrary File Access', 'Name' => 'TrendMicro OfficeScanNT Listener Traversal Arbitrary File Access',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module tests for directory traversal vulnerability in the UpdateAgent This module tests for directory traversal vulnerability in the UpdateAgent
function in the OfficeScanNT Listener (TmListen.exe) service in Trend Micro function in the OfficeScanNT Listener (TmListen.exe) service in Trend Micro

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Sh2kerr <research[ad]dsecrg.com>' ], 'Author' => [ 'Sh2kerr <research[ad]dsecrg.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://dsecrg.com/pages/pub/show.php?id=17' ], [ 'URL', 'http://dsecrg.com/pages/pub/show.php?id=17' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://www.petefinnigan.com/default/oracle_default_passwords.csv' ], [ 'URL', 'http://www.petefinnigan.com/default/oracle_default_passwords.csv' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'https://www.metasploit.com/users/mc' ], [ 'URL', 'https://www.metasploit.com/users/mc' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,8 +22,7 @@ class Metasploit3 < Msf::Auxiliary
run. run.
}, },
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>' ], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE
'Version' => '$Revision$'
)) ))
end end

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2008-5448' ], [ 'CVE', '2008-5448' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2009-1977' ], [ 'CVE', '2009-1977' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2010-0904' ], [ 'CVE', '2010-0904' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -23,7 +19,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'https://www.metasploit.com/users/mc' ], [ 'URL', 'https://www.metasploit.com/users/mc' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'CG' ], 'Author' => [ 'CG' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://www.argeniss.com/research/oraclesqlinj.zip' ], [ 'URL', 'http://www.argeniss.com/research/oraclesqlinj.zip' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -24,7 +20,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'https://www.metasploit.com/users/mc' ], [ 'URL', 'https://www.metasploit.com/users/mc' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => ['MC'], 'Author' => ['MC'],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'DisclosureDate' => 'Feb 1 2009' 'DisclosureDate' => 'Feb 1 2009'
)) ))

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'OSVDB', '368' ], [ 'OSVDB', '368' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,8 +27,7 @@ class Metasploit3 < Msf::Auxiliary
'References' => 'References' =>
[ [
[ 'URL', 'http://michaeldaw.org/sql-injection-cheat-sheet#postgres' ] [ 'URL', 'http://michaeldaw.org/sql-injection-cheat-sheet#postgres' ]
], ]
'Version' => '$Revision$'
)) ))
register_options( register_options(

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -28,8 +24,7 @@ class Metasploit3 < Msf::Auxiliary
'References' => 'References' =>
[ [
[ 'URL', 'www.postgresql.org' ] [ 'URL', 'www.postgresql.org' ]
], ]
'Version' => '$Revision$'
)) ))
#register_options( [ ], self.class) # None needed. #register_options( [ ], self.class) # None needed.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'SAP Management Console OSExecute', 'Name' => 'SAP Management Console OSExecute',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module allows execution of operating system commands through the SAP This module allows execution of operating system commands through the SAP
Management Console SOAP Interface. A valid username and password must be Management Console SOAP Interface. A valid username and password must be

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -26,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Luigi Auriemma', 'MC' ], 'Author' => [ 'Luigi Auriemma', 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2011-1566'], [ 'CVE', '2011-1566'],

View File

@ -27,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
[ [
[ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ]
], ],
'Version' => '$Revision$',
'DisclosureDate' => 'Apr 5 2012' 'DisclosureDate' => 'Apr 5 2012'
)) ))
register_options( register_options(

View File

@ -31,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary
[ [
[ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ]
], ],
'Version' => '$Revision$',
'DisclosureDate'=> 'Jan 19 2012' 'DisclosureDate'=> 'Jan 19 2012'
)) ))

View File

@ -35,7 +35,6 @@ class Metasploit3 < Msf::Auxiliary
[ [
[ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ]
], ],
'Version' => '$Revision$',
'DisclosureDate' => 'Apr 5 2012' 'DisclosureDate' => 'Apr 5 2012'
)) ))

View File

@ -34,7 +34,6 @@ class Metasploit3 < Msf::Auxiliary
[ [
[ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ]
], ],
'Version' => '$Revision$',
'DisclosureDate' => 'Jan 19 2012')) 'DisclosureDate' => 'Jan 19 2012'))
register_options( register_options(

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'toto' ], 'Author' => [ 'toto' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2007-6507' ], [ 'CVE', '2007-6507' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'SMB Scanner Check File/Directory Utility', 'Name' => 'SMB Scanner Check File/Directory Utility',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module is useful when checking an entire network This module is useful when checking an entire network
of SMB hosts for the presence of a known file or directory. of SMB hosts for the presence of a known file or directory.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'SMB Directory Listing Utility', 'Name' => 'SMB Directory Listing Utility',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module lists the directory of a target share and path. The only reason This module lists the directory of a target share and path. The only reason
to use this module is if your existing SMB client is not able to support the features to use this module is if your existing SMB client is not able to support the features

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Samba Symlink Directory Traversal', 'Name' => 'Samba Symlink Directory Traversal',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module exploits a directory traversal flaw in the Samba This module exploits a directory traversal flaw in the Samba
CIFS server. To exploit this flaw, a writeable share must be specified. CIFS server. To exploit this flaw, a writeable share must be specified.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'SMB File Upload Utility', 'Name' => 'SMB File Upload Utility',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module uploads a file to a target share and path. The only reason This module uploads a file to a target share and path. The only reason
to use this module is if your existing SMB client is not able to support the features to use this module is if your existing SMB client is not able to support the features

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -35,7 +31,6 @@ class Metasploit3 < Msf::Auxiliary
'jduck' # Ported to MSF v3 'jduck' # Ported to MSF v3
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['CVE', '2003-0027'], ['CVE', '2003-0027'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '30172'], ['OSVDB', '30172'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary
'theLightCosine' 'theLightCosine'
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['BID', '17978'], ['BID', '17978'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm'], 'Author' => [ 'hdm'],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '66842'], ['OSVDB', '66842'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm'], 'Author' => [ 'hdm'],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '66842'], ['OSVDB', '66842'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm'], 'Author' => [ 'hdm'],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '66842'], ['OSVDB', '66842'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm'], 'Author' => [ 'hdm'],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '66842'], ['OSVDB', '66842'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -30,7 +26,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '26772'], ['OSVDB', '26772'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'ikki', 'MC' ], 'Author' => [ 'ikki', 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'OSVDB', '71420'], [ 'OSVDB', '71420'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'John the Ripper AIX Password Cracker', 'Name' => 'John the Ripper AIX Password Cracker',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been This module uses John the Ripper to identify weak passwords that have been
acquired from passwd files on AIX systems. acquired from passwd files on AIX systems.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'John the Ripper Password Cracker (Fast Mode)', 'Name' => 'John the Ripper Password Cracker (Fast Mode)',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been This module uses John the Ripper to identify weak passwords that have been
acquired as hashed files (loot) or raw LANMAN/NTLM hashes (hashdump). The goal acquired as hashed files (loot) or raw LANMAN/NTLM hashes (hashdump). The goal

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'John the Ripper Linux Password Cracker', 'Name' => 'John the Ripper Linux Password Cracker',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been This module uses John the Ripper to identify weak passwords that have been
acquired from unshadowed passwd files from Unix systems. The module will only crack acquired from unshadowed passwd files from Unix systems. The module will only crack

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'John the Ripper MS SQL Password Cracker (Fast Mode)', 'Name' => 'John the Ripper MS SQL Password Cracker (Fast Mode)',
'Version' => "$Revision$",
'Description' => %Q{ 'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been This module uses John the Ripper to identify weak passwords that have been
acquired from the mssql_hashdump module. Passwords that have been successfully acquired from the mssql_hashdump module. Passwords that have been successfully

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'John the Ripper MySQL Password Cracker (Fast Mode)', 'Name' => 'John the Ripper MySQL Password Cracker (Fast Mode)',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been This module uses John the Ripper to identify weak passwords that have been
acquired from the mysql_hashdump module. Passwords that have been successfully acquired from the mysql_hashdump module. Passwords that have been successfully

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'John the Ripper Oracle Password Cracker (Fast Mode)', 'Name' => 'John the Ripper Oracle Password Cracker (Fast Mode)',
'Version' => "$Revision$",
'Description' => %Q{ 'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been This module uses John the Ripper to identify weak passwords that have been
acquired from the oracle_hashdump module. Passwords that have been successfully acquired from the oracle_hashdump module. Passwords that have been successfully

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -20,7 +16,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Unix Unshadow Utility', 'Name' => 'Unix Unshadow Utility',
'Version' => "$Revision$",
'Description' => %Q{ 'Description' => %Q{
This module takes a passwd and shadow file and 'unshadows' This module takes a passwd and shadow file and 'unshadows'
them and saves them as linux.hashes loot. them and saves them as linux.hashes loot.

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -22,7 +18,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Postgres SQL md5 Password Cracker', 'Name' => 'Postgres SQL md5 Password Cracker',
'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module attempts to crack Postgres SQL md5 password hashes. This module attempts to crack Postgres SQL md5 password hashes.
It creates hashes based on information saved in the MSF Database It creates hashes based on information saved in the MSF Database

View File

@ -1,7 +1,3 @@
###
# $Id$
###
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -16,7 +12,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'BNAT Router', 'Name' => 'BNAT Router',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module will properly route BNAT traffic and allow for connections to be This module will properly route BNAT traffic and allow for connections to be
established to machines on ports which might not otherwise be accessible.}, established to machines on ports which might not otherwise be accessible.},

View File

@ -1,7 +1,3 @@
###
# $Id$
###
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -18,7 +14,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'BNAT Scanner', 'Name' => 'BNAT Scanner',
'Version' => '$Revision$',
'Description' => %q{ 'Description' => %q{
This module is a scanner which can detect Broken NAT (network address translation) This module is a scanner which can detect Broken NAT (network address translation)
implementations, which could result in a inability to reach ports on remote implementations, which could result in a inability to reach ports on remote

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
engineering. engineering.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://spl0it.org/' ], [ 'URL', 'http://spl0it.org/' ],

View File

@ -1,7 +1,5 @@
#!/usr/bin/env ruby #!/usr/bin/env ruby
# #
# $Id$
#
# Web Crawler. # Web Crawler.
# #
# Author: Efrain Torres et [at] metasploit.com 2010 # Author: Efrain Torres et [at] metasploit.com 2010
@ -24,7 +22,6 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Metasploit Web Crawler', 'Name' => 'Metasploit Web Crawler',
'Version' => '$Revision$',
'Description' => 'This auxiliary module is a modular web crawler, to be used in conjuntion with wmap (someday) or standalone.', 'Description' => 'This auxiliary module is a modular web crawler, to be used in conjuntion with wmap (someday) or standalone.',
'Author' => 'et', 'Author' => 'et',
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ], 'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', '1154'], [ 'BID', '1154'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary
'theLightCosine' # msf module 'theLightCosine' # msf module
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2010-2156' ], [ 'CVE', '2010-2156' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://lists.immunitysec.com/pipermail/dailydave/2006-February/002982.html' ], [ 'URL', 'http://lists.immunitysec.com/pipermail/dailydave/2006-February/002982.html' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
'sinn3r', #msf 'sinn3r', #msf
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2011-0514' ], [ 'CVE', '2011-0514' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
# patrickw - I am not sure if these are correct, but the closest match! # patrickw - I am not sure if these are correct, but the closest match!

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -43,7 +39,6 @@ class Metasploit3 < Msf::Auxiliary
'Brett Gervasoni', # original discovery 'Brett Gervasoni', # original discovery
'jduck' 'jduck'
], ],
'Version' => '$Revision$',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
'Masashi Fujiwara' #metasploit module 'Masashi Fujiwara' #metasploit module
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', '49303'], [ 'BID', '49303'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -32,7 +28,6 @@ class Metasploit3 < Msf::Auxiliary
'Paulino Calderon <calderon [at] websec {dot} mx>', #metasploit module 'Paulino Calderon <calderon [at] websec {dot} mx>', #metasploit module
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2010-2227' ], [ 'CVE', '2010-2227' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-02/0650.html' ], [ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-02/0650.html' ],

View File

@ -36,7 +36,6 @@ class Metasploit3 < Msf::Auxiliary
'Christian Mehlmauer <FireFart[at]gmail.com>' # metasploit module 'Christian Mehlmauer <FireFart[at]gmail.com>' # metasploit module
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['URL', 'http://www.ocert.org/advisories/ocert-2011-003.html'], ['URL', 'http://www.ocert.org/advisories/ocert-2011-003.html'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => [ 'References' => [
[ 'BID', '35145' ], [ 'BID', '35145' ],
#[ 'CVE', '' ], # no CVE? #[ 'CVE', '' ], # no CVE?

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -27,7 +23,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => 'kris katterjohn', 'Author' => 'kris katterjohn',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => [ 'References' => [
[ 'BID', '30644'], [ 'BID', '30644'],
[ 'CVE', '2008-3656'], [ 'CVE', '2008-3656'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -25,7 +21,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => 'kris katterjohn', 'Author' => 'kris katterjohn',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => [ 'References' => [
[ 'CVE', '2008-5081' ], [ 'CVE', '2008-5081' ],
[ 'OSVDB', '50929' ], [ 'OSVDB', '50929' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -31,7 +27,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'todb' ], 'Author' => [ 'todb' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', '37255' ], [ 'BID', '37255' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'patrick' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', '5807' ], [ 'BID', '5807' ],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm' ], 'Author' => [ 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['CVE', '2007-2446'], ['CVE', '2007-2446'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -28,7 +24,6 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'hdm' ], 'Author' => [ 'hdm' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
['CVE', '2007-2446'], ['CVE', '2007-2446'],

View File

@ -1,7 +1,3 @@
##
# $Id$
##
## ##
# This file is part of the Metasploit Framework and may be subject to # This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit # redistribution and commercial restrictions. Please see the Metasploit
@ -29,7 +25,6 @@ class Metasploit3 < Msf::Auxiliary
'jfa', # Metasploit module 'jfa', # Metasploit module
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2011-3486' ], [ 'CVE', '2011-3486' ],

View File

@ -43,7 +43,6 @@ class Metasploit3 < Msf::Auxiliary
[ [
[ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ] [ 'URL', 'http://www.digitalbond.com/tools/basecamp/metasploit-modules/' ]
], ],
'Version' => '$Revision$',
'DisclosureDate' => 'Jan 19 2012' 'DisclosureDate' => 'Jan 19 2012'
)) ))

Some files were not shown because too many files have changed in this diff Show More