commit
4b7a438d45
|
@ -91,7 +91,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
:port => rport,
|
||||
:user => row[0],
|
||||
:pass => row[2],
|
||||
:type => "hash",
|
||||
:type => "mysql_hash",
|
||||
:sname => "mysql",
|
||||
:active => true
|
||||
})
|
||||
|
|
|
@ -22,17 +22,14 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(
|
||||
'Name' => 'SMB File Delete Utility',
|
||||
'Description' => %Q{
|
||||
This module deletes a file from a target share and path. The only reason
|
||||
to use this module is if your existing SMB client is not able to support the features
|
||||
of the Metasploit Framework that you need, like pass-the-hash authentication.
|
||||
This module deletes a file from a target share and path. The usual reason
|
||||
to use this module is to work around limitations in an existing SMB client that may not
|
||||
be able to take advantage of pass-the-hash style authentication.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
'mubix' # copied from hdm upload_file module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
||||
|
|
|
@ -22,17 +22,14 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(
|
||||
'Name' => 'SMB File Download Utility',
|
||||
'Description' => %Q{
|
||||
This module downloads a file from a target share and path. The only reason
|
||||
to use this module is if your existing SMB client is not able to support the features
|
||||
of the Metasploit Framework that you need, like pass-the-hash authentication.
|
||||
This module deletes a file from a target share and path. The usual reason
|
||||
to use this module is to work around limitations in an existing SMB client that may not
|
||||
be able to take advantage of pass-the-hash style authentication.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
'mubix' # copied from hdm upload_file module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
|
||||
|
|
|
@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Node.js HTTP Pipelining DoS',
|
||||
'Name' => 'Node.js HTTP Pipelining Denial of Service',
|
||||
'Description' => %q{
|
||||
This module exploits a DoS in the HTTP parser of Node.js versions
|
||||
This module exploits a Denial of Service (DoS) condition in the HTTP parser of Node.js versions
|
||||
released before 0.10.21 and 0.8.26. The attack sends many pipelined
|
||||
HTTP requests on a single connection, which causes unbounded memory
|
||||
allocation when the client does not read the responses.
|
||||
|
|
|
@ -19,9 +19,10 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Jenkins Vulnerability Scanner',
|
||||
'Name' => 'Jenkins Enumeration',
|
||||
'Description' => %q{
|
||||
This module scans a Jenkins installation for a few vulnerabilities.
|
||||
This module enumerates a remote Jenkins installation in an unauthenticated manner, including
|
||||
host operating system and and Jenkins installation details.
|
||||
},
|
||||
'Author' => 'Jeff McCutchan',
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'D-Link DIR-605L Captcha Handling Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits an anonymous remote code execution on D-Link DIR-605L routers. The
|
||||
This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
|
||||
vulnerability exists while handling user supplied captcha information, and is due to the
|
||||
insecure usage of sprintf on the getAuthCode() function. This module has been tested
|
||||
successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.
|
||||
|
|
|
@ -19,9 +19,9 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
super( update_info( info,
|
||||
'Name' => 'Mac OS X Persistent Payload Installer',
|
||||
'Description' => %q{
|
||||
This module provides a persistence boot payload by creating a plist entry
|
||||
This module provides a persistent boot payload by creating a plist entry
|
||||
in current user's ~/Library/LaunchAgents directory. Whenever the user logs in,
|
||||
the LaunchAgent will be invoked and our dropped payload will run.
|
||||
the LaunchAgent will be invoked and this dropped payload will run.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ "Marcin 'Icewall' Noga <marcin[at]icewall.pl>", "joev" ],
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a remote command-injection vulnerability in EMC Replication Manager
|
||||
client (irccd.exe). By sending a specially crafted message invoking RunProgram function an
|
||||
attacker may be able to execute arbitrary code commands with SYSTEM privileges. Affected
|
||||
attacker may be able to execute arbitrary commands with SYSTEM privileges. Affected
|
||||
products are EMC Replication Manager < 5.3. This module has been successfully tested
|
||||
against EMC Replication Manager 5.2.1 on XP/W2003. EMC Networker Module for Microsoft
|
||||
Applications 2.1 and 2.2 may be vulnerable too although this module have not been tested
|
||||
|
|
|
@ -1,8 +1,6 @@
|
|||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/
|
||||
# This module requires Metasploit: http//metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
|
@ -15,16 +13,16 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info(info,
|
||||
'Name' => 'Windows Single Sign On Credential Collector (Mimikatz)',
|
||||
'Description' => %q{
|
||||
'Name' => 'Windows Single Sign On Credential Collector (Mimikatz)',
|
||||
'Description' => %q{
|
||||
This module will collect cleartext Single Sign On credentials from the Local
|
||||
Security Authority using the Mimikatz extension. Blank passwords will not be stored
|
||||
in the database.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => ['Ben Campbell <eat_meatballs[at]hotmail.co.uk>'],
|
||||
'Platform' => ['win'],
|
||||
'SessionTypes' => ['meterpreter' ]
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => ['Ben Campbell <eat_meatballs[at]hotmail.co.uk>'],
|
||||
'Platform' => ['win'],
|
||||
'SessionTypes' => ['meterpreter' ]
|
||||
))
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue