Merge branch 'master' into fix_misc_loot_bugs

GSoC/Meterpreter_Web_Console
James Barnett 2019-01-14 11:15:06 -06:00
commit 3f9c0e160a
No known key found for this signature in database
GPG Key ID: 647983861A4EC5EA
94 changed files with 94 additions and 94 deletions

View File

@ -64,7 +64,6 @@ wwebb-r7 <wwebb-r7@github> <William_Webb@rapid7.com>
bannedit <bannedit@github> David Rude <bannedit0@gmail.com>
bcoles <bcoles@github> bcoles <bcoles@gmail.com>
bcoles <bcoles@github> Brendan Coles <bcoles@gmail.com>
bokojan <bokojan@github> parzamendi-r7 <peter_arzamendi@rapid7.com>
brandonprry <brandonprry@github> <bperry@brandons-mbp.attlocal.net>
brandonprry <brandonprry@github> Brandon Perry <bperry@bperry-rapid7.(none)>

View File

@ -22,4 +22,4 @@ xMMMMMMMMMd ,0MMMMMMMMMMK;
%red 'oOWMMMMMMMMo%clr +:+
%red .,cdkO0K;%clr :+: :+:
:::::::+:
%whiMetasploit%clr %yelUnder Construction%clr
%whiMetasploit%clr

View File

@ -18,6 +18,7 @@ class Msf::Author
'amaloteaux' => 'alex_maloteaux' + 0x40.chr + 'metasploit.com',
'aushack' => 'patrick' + 0x40.chr + 'osisecurity.com.au',
'bannedit' => 'bannedit' + 0x40.chr + 'metasploit.com',
'bcoles' => 'bcoles' + 0x40.chr + 'gmail.com',
'Carlos Perez' => 'carlos_perez' + 0x40.chr + 'darkoperator.com',
'cazz' => 'bmc' + 0x40.chr + 'shmoo.com',
'CG' => 'cg' + 0x40.chr + 'carnal0wnage.com',

View File

@ -33,8 +33,8 @@ module EventServlet
def self.report_event
lambda {
warden.authenticate!
begin
warden.authenticate!
job = lambda { |opts| get_db.report_event(opts) }
exec_report_job(request, &job)
rescue => e

View File

@ -34,7 +34,7 @@ module HostServlet
data = data.first if is_single_object?(data, sanitized_params)
set_json_data_response(response: data, includes: includes)
rescue => e
print_error_and_create_response(error: e, message: 'There was an error getting hosts:', code: 500)
print_error_and_create_response(error: e, message: 'There was an error retrieving hosts:', code: 500)
end
}
end

View File

@ -18,8 +18,8 @@ module MsfServlet
def self.get_msf_version
lambda {
warden.authenticate!
begin
warden.authenticate!
set_json_data_response(response: { metasploit_version: Metasploit::Framework::VERSION })
rescue => e
print_error_and_create_response(error: e, message: 'There was an error retrieving the version:', code: 500)

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Auxiliary
This module has been tested successfully with ScadaBR
versions 1.0 CE and 0.9 on Windows and Ubuntu systems.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'References' => ['URL', 'http://www.scadabr.com.br/?q=node/1375'],
'Targets' => [[ 'Automatic', {} ]],

View File

@ -104,7 +104,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
# Report output
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(

View File

@ -72,7 +72,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
unless output.nil?
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(

View File

@ -39,14 +39,14 @@ class MetasploitModule < Msf::Auxiliary
end
def run
if datastore['PDFINJECT'].to_s.end_with?('.pdf') && datastore['FILENAME'].to_s.end_with?('.pdf')
if datastore['PDFINJECT'].nil? && datastore['FILENAME'].nil?
print_error 'Please configure either FILENAME or PDFINJECT'
elsif !datastore['PDFINJECT'].nil? && datastore['PDFINJECT'].to_s.end_with?('.pdf')
injectpdf
elsif !datastore['FILENAME'].nil? && datastore['FILENAME'].to_s.end_with?('.pdf')
createpdf
else
print_error 'FILENAME or PDFINJECT must end with '.pdf' file extension'
print_error "FILENAME or PDFINJECT must end with '.pdf' file extension"
end
end

View File

@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
This module retrieves SIP and IAX2 user extensions and credentials from
Asterisk Call Manager service. Valid manager credentials are required.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'http://www.asterisk.name/sip1.html'],

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Auxiliary
Note: All tokens expire after 30 minutes of inactivity by default.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'https://doliforge.org/tracker/?func=detail&aid=1212&group_id=144'],

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Auxiliary
and extract the author's name from the document metadata.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>'))
'Author' => 'bcoles'))
register_options(
[
OptString.new('URL', [ false, 'The target URL', '' ]),

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Auxiliary
to become unresponsive until the server completes the request.
},
'Platform' => 'win',
'Author' => [ 'Brendan Coles <bcoles[at]gmail.com>' ],
'Author' => [ 'bcoles' ],
'License' => MSF_LICENSE,
'References' =>
[

View File

@ -18,7 +18,7 @@ class MetasploitModule < Msf::Auxiliary
This module has been tested successfully on TeamTalk versions
5.2.2.4885 and 5.2.3.4893.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
# Protocol documentation

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Auxiliary
'Author' =>
[
'Pedro Ribeiro <pedrib[at]gmail.com>', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # metasploit module
'bcoles' # metasploit module
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Auxiliary
[
['URL', 'http://news.netwinsite.com:8119/webnews?cmd=body&item=34896&group=netwin.surgemail'],
],
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'DisclosureDate' => 'Jun 16 2017'))
register_options [ Opt::RPORT(9080) ]
deregister_options 'RHOST'

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Auxiliary
'Author' =>
[
'R-73eN', # Vulnerability Discovery
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module
'bcoles' # Metasploit module
],
'References' =>
[

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Auxiliary
but does not support AUTHINFO GENERIC or AUTHINFO SASL
authentication methods.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'References' => [ [ 'CVE', '1999-0502' ], # Weak password
[ 'URL', 'https://tools.ietf.org/html/rfc3977' ],

View File

@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
Discover information from Web Services Dynamic Discovery (WS-Discovery)
enabled systems.
},
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'References' =>
[

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Mike Baucom', 'Allen Harper', 'J. Rach', # Initial discovery by Tangible Security
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'Payload' =>
{

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Paul Davies (UHF-Satcom)', # Initial vulnerability discovery and PoC
'Andrew Tierney (Pen Test Partners)', # Independent vulnerability discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'linux',

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -32,7 +32,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Ivan Huertas', # Discovery and PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Arch' => ARCH_CMD,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
'bcoles', # Discovery and exploit
],
'References' =>
[

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
'bcoles', # Discovery and exploit
],
'License' => MSF_LICENSE,
'Privileged' => false,

View File

@ -34,7 +34,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Tavis Ormandy', # Discovery and C exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Apr 14 2015',
'Platform' => [ 'linux' ],

View File

@ -41,7 +41,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'rebel', # Discovery and chocobo_root.c exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Aug 12 2016',
'Platform' => [ 'linux' ],

View File

@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Andrey Konovalov', # Discovery and C exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Mar 29 2017',
'Platform' => [ 'linux' ],

View File

@ -40,7 +40,7 @@ class MetasploitModule < Msf::Exploit::Local
'Stéphane Graber', # Independent discovery, PoC and patch
'Tavis Ormandy', # Independent discovery and C exploit
'Ricardo F. Teixeira', # shell exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Mar 31 2015',
'Platform' => [ 'linux' ],

View File

@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Local
'zx2c4', # "I Can't Read and I Won't Race You Either" exploit
'Marco Ivaldi', # raptor_ldaudit and raptor_ldaudit2 exploits
'Todor Donev', # libmemusage.so exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 18 2010',
'Platform' => 'linux',

View File

@ -48,7 +48,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Tavis Ormandy', # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 18 2010',
'Platform' => 'linux',

View File

@ -34,7 +34,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'halfdog', # Discovery and RationalLove.c exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jan 16 2018',
'Platform' => [ 'linux' ],

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Ryan Beisner', # Discovery and PoC
'David Ames (@thedac)', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Apr 13 2017',
'Platform' => [ 'linux' ],

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
"King's Way", # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Feb 2 2016',
'References' =>

View File

@ -49,7 +49,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Qualys', # Discovery and C exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jul 24 2015',
'Platform' => [ 'linux' ],

View File

@ -36,7 +36,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Denis Andzakovic', # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jul 26 2018',
'References' =>

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Dan Rosenberg', # Discovery and C exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 20 2010',
'Platform' => [ 'linux' ],

View File

@ -43,7 +43,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Andrey Konovalov', # Discovery and C exploit
'h00die', # Metasploit module
'Brendan Coles' # Metasploit module
'bcoles' # Metasploit module
],
'DisclosureDate' => 'Aug 10 2017',
'Platform' => [ 'linux' ],

View File

@ -39,7 +39,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Jann Horn', # Discovery and PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'May 22 2017',
'Platform' => 'linux',

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Friedrich Postelstorfer', # Initial public disclosure and Python exploit
'jduck', # Independent discovery and C exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'unix',

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Ricky "HeadlessZeke" Lawshae', # Discovery
'coldfusion39', # VertXploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'linux',

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Zenofex', # Initial vulnerability discovery and PoC
'0x00string', # Initial vulnerability discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'Platform' => 'linux',

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'steelo <knownsteelo[at]gmail.com>', # Vulnerability Discovery & Python Exploit
'hdm', # Metasploit Module
'Brendan Coles <bcoles[at]gmail.com>', # Check logic
'bcoles', # Check logic
],
'License' => MSF_LICENSE,
'References' =>

View File

@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' => [
'Stephane Chazelas', # Vulnerability discovery
'lcamtuf', # CVE-2014-6278
'Brendan Coles <bcoles[at]gmail.com>' # msf
'bcoles' # msf
],
'References' => [
[ 'CVE', '2014-6271' ],

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'AkaStep', # Discovery
'Brendan Coles <bcoles[at]gmail.com>' # metasploit exploit
'bcoles' # metasploit exploit
],
'References' =>
[

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
},
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'License' => MSF_LICENSE,
'DefaultOptions' =>

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'SecuriTeam', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
the web interface.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['OSVDB', '99199'],

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
and version 3.2.0 on Debian Linux 8.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'http://wiki.processmaker.com/3.0/Plugin_Development']

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Discovery and exploit
'bcoles' # Discovery and exploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Daniel Lawson', # Discovery and exploit
'Romain Trouve', # Discovery and exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Sep 23 2016',
'Platform' => %w(linux solaris),

View File

@ -41,7 +41,7 @@ class MetasploitModule < Msf::Exploit::Local
'Narendra Shinde', # Discovery and exploit
'Raptor - 0xdea', # Modified exploit for cron
'Aaron Ringo', # Metasploit module
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module
'bcoles' # Metasploit module
],
'DisclosureDate' => 'Oct 25 2018',
'References' =>

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
4.14 on Windows 7 SP1.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
[ 'URL', 'https://help.rapid7.com/metasploit/Content/api/rpc/overview.html' ],

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'cenobyte', # Discovery and exploit
'Tim Brown', # Independent discovery
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'David Odell', # Discovery
'Mor!p3r', # PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -53,7 +53,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'Shadow Brokers', # exploit
'Hacker Fantastic', # dtappgather-poc.sh
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Apr 24 2017',
'Privileged' => true,

View File

@ -51,7 +51,7 @@ class MetasploitModule < Msf::Exploit::Local
[
'iDefense', # Discovery
'Marco Ivaldi', # Exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Oct 11 2006',
'Privileged' => true,

View File

@ -57,7 +57,7 @@ class MetasploitModule < Msf::Exploit::Local
'Author' =>
[
'Qualys Corporation', # Stack Clash technique and Solaris_rsh.c exploit
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'DisclosureDate' => 'Jun 19 2017',
'Privileged' => true,

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Bradley Austin (steponequit)', # Initial discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -38,7 +38,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'Leandro Barragan', # Discovery and PoC
'Guido Leo', # Discovery and PoC
'Brendan Coles', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'David Odell', # Discovery
'Mor!p3r', # PoC
'Brendan Coles' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Benjamin Harris', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'x-hayben21', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Pichaya Morimoto', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'drone', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit module
'bcoles' # Metasploit module
],
'References' =>
[

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Braeden Thomas', # Initial discovery + Piwik PoC
'Gjoko Krstic <gjoko[at]zeroscience.mk>', # OpenEMR PoC
'Halim Cruzito', # zonPHP PoC
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'EgiX', # Discovery
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit
'bcoles' # msf exploit
],
'References' =>
[

View File

@ -21,7 +21,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'AkaStep', # Discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit
'bcoles' # msf exploit
],
'References' =>
[

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Fady Mohammed Osman', # Discovery and Exploit
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'vinicius777[at]gmail.com', # Auth bypass discovery and PoC, kinda
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
and 2.13 RC1 on CentOS.
},
'License' => MSF_LICENSE,
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'References' =>
[
['URL', 'http://www.vicidial.org/VICIDIALmantis/view.php?id=1016']

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'Author' =>
[
'Brendan Coles <bcoles[at]gmail.com>', # Discovery and exploit
'bcoles', # Discovery and exploit
],
'License' => MSF_LICENSE,
'Privileged' => true,

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'mr_me <steven[at]srcincite.io>', # vulnerability discovery and exploit
'Brendan Coles <bcoles [at] gmail.com>', # hidden hta tricks!
'bcoles', # hidden hta tricks!
'sinn3r' # help with msf foo!
],
'References' =>

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'RjRjh Hack3r', # Original discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>' # msf exploit
'bcoles' # msf exploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Serge Gorbunov', # Initial discovery
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -136,7 +136,7 @@ class MetasploitModule < Msf::Exploit::Remote
payload_url = ""
@payload_path = ""
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
print_good("Payload uploaded successfuly")
print_good("Payload uploaded successfully")
else
print_error("Payload upload failed")
return

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'LSO <lso[at]hushmail.com>', # original metasploit
'Brendan Coles <bcoles[at]gmail.com>' # metasploit
'bcoles' # metasploit
],
'License' => BSD_LICENSE,
'References' =>

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'AkaStep', # Initial discovery
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Gjoko Krstic(LiquidWorm) <gjoko[at]zeroscience.mk>', # Discovery and exploit
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'sztivi', # Discovery
'Chris Lyne', # Python PoC (@lynerc)
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -31,7 +31,7 @@ class MetasploitModule < Msf::Exploit::Remote
[
'sztivi', # Discovery
'Chris Lyne', # Python PoC (@lynerc)
'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
'bcoles' # Metasploit
],
'References' =>
[

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Author' =>
[
'Mohamed Shetta <mshetta[at]live.com>', # Initial discovery and PoC
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
],
'References' =>
[

View File

@ -19,7 +19,7 @@ module MetasploitModule
'Name' => 'Unix Command Shell, Reverse TCP (via Python)',
'Version' => '$Revision: 1 $',
'Description' => 'Connect back and create a command shell via Python',
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'Author' => 'bcoles',
'License' => MSF_LICENSE,
'Platform' => 'unix',
'Arch' => ARCH_CMD,

View File

@ -85,7 +85,7 @@ EOS
ring0_code =
#"\xcc" +
# save registers -- necessary for successfuly recovery
# save registers -- necessary for successful recovery
"\x60" +
# get EPROCESS from ETHREAD
"\x64\xa1\x24\x01\x00\x00" +

View File

@ -103,7 +103,7 @@ class MetasploitModule < Msf::Post
if !recovery_key.nil?
recovery_key = recovery_key[1]
id_key_tmp = id_key_tmp[1]
print_good("Recovery key generated successfuly : #{recovery_key}")
print_good("Recovery key generated successfully : #{recovery_key}")
else
print_error('Recovery Key generation failed')
print_status('No recovery key can be used')

View File

@ -16,7 +16,7 @@ class MetasploitModule < Msf::Post
files in Microsoft Plus! 98 and Windows Me.
},
'License' => MSF_LICENSE,
'Author' => ['Brendan Coles <bcoles[at]gmail.com>'],
'Author' => ['bcoles'],
'References' =>
[
['CVE', '2001-0152'],

View File

@ -16,7 +16,7 @@ class MetasploitModule < Msf::Post
FTP client for Windows.
},
'License' => MSF_LICENSE,
'Author' => [ 'Brendan Coles <bcoles[at]gmail.com>' ],
'Author' => [ 'bcoles' ],
'Platform' => [ 'win' ],
'SessionTypes' => [ 'meterpreter' ]
))

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Post
'License' => MSF_LICENSE,
'Author' => [
'Joe Giron', # Discovery and PoC (@theonlyevil1)
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
'bcoles', # Metasploit
'sinn3r' # shell session support
],
'References' =>