From 8989d6dff235d80a01bedc6654da49de58922965 Mon Sep 17 00:00:00 2001 From: TC Johnson Date: Tue, 1 Aug 2017 22:39:14 -0400 Subject: [PATCH] Modified Accuvant bog posts to the new Optive urls --- modules/auxiliary/admin/smb/psexec_command.rb | 2 +- modules/auxiliary/admin/smb/psexec_ntdsgrab.rb | 2 +- modules/exploits/multi/misc/java_jmx_server.rb | 2 +- modules/exploits/windows/smb/psexec.rb | 2 +- modules/exploits/windows/smb/psexec_psh.rb | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/modules/auxiliary/admin/smb/psexec_command.rb b/modules/auxiliary/admin/smb/psexec_command.rb index 9491709e13..1c02889282 100644 --- a/modules/auxiliary/admin/smb/psexec_command.rb +++ b/modules/auxiliary/admin/smb/psexec_command.rb @@ -32,7 +32,7 @@ class MetasploitModule < Msf::Auxiliary 'References' => [ [ 'CVE', '1999-0504'], # Administrator with no password (since this is the default) [ 'OSVDB', '3106'], - [ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ], + [ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ], [ 'URL', 'http://sourceforge.net/projects/smbexec/' ], [ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ] ] diff --git a/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb b/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb index eaefe98b4a..578da53358 100644 --- a/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb +++ b/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb @@ -32,7 +32,7 @@ class MetasploitModule < Msf::Auxiliary 'License'=> MSF_LICENSE, 'References' => [ [ 'URL', 'http://sourceforge.net/projects/smbexec' ], - [ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ] + [ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ] ] )) diff --git a/modules/exploits/multi/misc/java_jmx_server.rb b/modules/exploits/multi/misc/java_jmx_server.rb index 19ce2d701a..a8181eeeda 100644 --- a/modules/exploits/multi/misc/java_jmx_server.rb +++ b/modules/exploits/multi/misc/java_jmx_server.rb @@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote 'References' => [ ['URL', 'https://docs.oracle.com/javase/8/docs/technotes/guides/jmx/JMX_1_4_specification.pdf'], - ['URL', 'http://www.accuvant.com/blog/exploiting-jmx-rmi'], + ['URL', 'https://www.optiv.com/blog/exploiting-jmx-rmi'], ['CVE', '2015-2342'] ], 'Platform' => 'java', diff --git a/modules/exploits/windows/smb/psexec.rb b/modules/exploits/windows/smb/psexec.rb index afbc038998..a8c0e924fb 100644 --- a/modules/exploits/windows/smb/psexec.rb +++ b/modules/exploits/windows/smb/psexec.rb @@ -50,7 +50,7 @@ class MetasploitModule < Msf::Exploit::Remote [ 'CVE', '1999-0504'], # Administrator with no password (since this is the default) [ 'OSVDB', '3106'], [ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ], - [ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ], + [ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ], [ 'URL', 'http://sourceforge.net/projects/smbexec/' ] ], 'Payload' => diff --git a/modules/exploits/windows/smb/psexec_psh.rb b/modules/exploits/windows/smb/psexec_psh.rb index 6fe310acf5..f2046b2d17 100644 --- a/modules/exploits/windows/smb/psexec_psh.rb +++ b/modules/exploits/windows/smb/psexec_psh.rb @@ -56,7 +56,7 @@ class MetasploitModule < Msf::Exploit::Remote 'References' => [ [ 'CVE', '1999-0504'], # Administrator with no password (since this is the default) [ 'OSVDB', '3106'], - [ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ], + [ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ], [ 'URL', 'http://sourceforge.net/projects/smbexec/' ], [ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ] ]