From 43229c16e77003bdfe482fc6e5d4b934ac791b0f Mon Sep 17 00:00:00 2001 From: Jon Hart Date: Fri, 6 Nov 2015 13:24:58 -0800 Subject: [PATCH] Correct some authors with unbalanced angle brackets --- modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb | 2 +- modules/auxiliary/scanner/quake/server_info.rb | 2 +- modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb | 2 +- modules/exploits/windows/mysql/mysql_start_up.rb | 2 +- modules/exploits/windows/smb/psexec_psh.rb | 2 +- modules/post/multi/gather/lastpass_creds.rb | 2 +- modules/post/windows/gather/phish_windows_credentials.rb | 2 +- 7 files changed, 7 insertions(+), 7 deletions(-) diff --git a/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb b/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb index f5b72fe5ce..acb1737c39 100644 --- a/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb +++ b/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary 'Author' => [ 'jclaudius ', - 'lguay ' ], 'License' => MSF_LICENSE, 'References' => diff --git a/modules/auxiliary/scanner/quake/server_info.rb b/modules/auxiliary/scanner/quake/server_info.rb index 7d4c9e24ea..f8012e7a4c 100644 --- a/modules/auxiliary/scanner/quake/server_info.rb +++ b/modules/auxiliary/scanner/quake/server_info.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary This module uses the getstatus or getinfo request to obtain information from a Quakeserver. ), - 'Author' => 'Jon Hart 'Jon Hart ', 'References' => [ ['URL', 'ftp://ftp.idsoftware.com/idstuff/quake3/docs/server.txt'] diff --git a/modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb b/modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb index 74753d8cb2..2839baa385 100644 --- a/modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb +++ b/modules/exploits/windows/http/kaseya_uploadimage_file_upload.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ - 'Thomas Hibbert ' # Vulnerability discovery and MSF module ], 'License' => MSF_LICENSE, 'References' => diff --git a/modules/exploits/windows/mysql/mysql_start_up.rb b/modules/exploits/windows/mysql/mysql_start_up.rb index e3f111db6c..9a26596055 100644 --- a/modules/exploits/windows/mysql/mysql_start_up.rb +++ b/modules/exploits/windows/mysql/mysql_start_up.rb @@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'sinn3r', - 'Sean Verity ' ], 'DefaultOptions' => { diff --git a/modules/exploits/windows/smb/psexec_psh.rb b/modules/exploits/windows/smb/psexec_psh.rb index bb61a3fe3b..0c45d00c83 100644 --- a/modules/exploits/windows/smb/psexec_psh.rb +++ b/modules/exploits/windows/smb/psexec_psh.rb @@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Author' => [ 'Royce @R3dy__ Davis ', # PSExec command module - 'RageLtMan ' # PSH exploit, libs, encoders ], 'License' => MSF_LICENSE, 'Privileged' => true, diff --git a/modules/post/multi/gather/lastpass_creds.rb b/modules/post/multi/gather/lastpass_creds.rb index 64e87043fe..05941ee7cf 100644 --- a/modules/post/multi/gather/lastpass_creds.rb +++ b/modules/post/multi/gather/lastpass_creds.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post 'Author' => [ 'Alberto Garcia Illera ', # original module and research 'Martin Vigo ', # original module and research - 'Jon Hart ' # module rework and cleanup ], 'Platform' => %w(linux osx unix win), 'References' => [['URL', 'http://www.martinvigo.com/a-look-into-lastpass/']], diff --git a/modules/post/windows/gather/phish_windows_credentials.rb b/modules/post/windows/gather/phish_windows_credentials.rb index 2bf68fa43c..f01d8c6b95 100644 --- a/modules/post/windows/gather/phish_windows_credentials.rb +++ b/modules/post/windows/gather/phish_windows_credentials.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post 'License' => MSF_LICENSE, 'Author' => [ - 'Wesley Neelen ', # Metasploit module, @wez3forsec on Twitter 'Matt Nelson' # Original powershell script, @enigma0x3 on Twitter ], 'References' => [ 'URL', 'https://forsec.nl/2015/02/windows-credentials-phishing-using-metasploit' ],