Small tidy of the multiport_egress_traffic module

bug/bundler_fix
OJ 2016-11-01 01:46:58 +10:00
parent ec8536f7e9
commit 557424d2ec
No known key found for this signature in database
GPG Key ID: D5DC61FB93260597
1 changed files with 18 additions and 18 deletions

View File

@ -11,27 +11,27 @@ require 'rex'
class MetasploitModule < Msf::Post
def initialize(info = {})
super(update_info(info,
'Name' => 'Generate TCP/UDP Outbound Traffic On Multiple Ports',
'Description' => %q(
This module generates TCP or UDP traffic across a
sequence of ports, and is useful for finding firewall
holes and egress filtering. It only generates traffic
on the port range you specify. It is up to you to
run a responder or packet capture tool on a remote
endpoint to determine which ports are open.
),
'License' => MSF_LICENSE,
'Author' => 'Stuart Morgan <stuart.morgan[at]mwrinfosecurity.com>',
'Platform' => [ 'linux', 'osx', 'unix', 'solaris', 'bsd', 'windows' ],
'SessionTypes' => ['meterpreter']
))
'Name' => 'Generate TCP/UDP Outbound Traffic On Multiple Ports',
'Description' => %q(
This module generates TCP or UDP traffic across a
sequence of ports, and is useful for finding firewall
holes and egress filtering. It only generates traffic
on the port range you specify. It is up to you to
run a responder or packet capture tool on a remote
endpoint to determine which ports are open.
),
'License' => MSF_LICENSE,
'Author' => 'Stuart Morgan <stuart.morgan[at]mwrinfosecurity.com>',
'Platform' => ['linux', 'osx', 'unix', 'solaris', 'bsd', 'windows'],
'SessionTypes' => ['meterpreter']
))
register_options(
[
OptAddress.new('TARGET', [ true, 'Destination IP address.']),
OptAddress.new('TARGET', [true, 'Destination IP address.']),
OptString.new('PORTS', [true, 'Ports to test.', '22,23,53,80,88,443,445,33434-33534']),
OptEnum.new('PROTOCOL', [ true, 'Protocol to use.', 'TCP', [ 'TCP', 'UDP', 'ALL' ]]),
OptEnum.new('METHOD', [ true, 'The mechanism by which the packets are generated. Can be NATIVE or WINAPI (Windows only).', 'NATIVE', [ 'NATIVE', 'WINAPI' ]]),
OptEnum.new('PROTOCOL', [true, 'Protocol to use.', 'TCP', [ 'TCP', 'UDP', 'ALL' ]]),
OptEnum.new('METHOD', [true, 'The mechanism by which the packets are generated. Can be NATIVE or WINAPI (Windows only).', 'NATIVE', [ 'NATIVE', 'WINAPI']]),
OptInt.new('THREADS', [true, 'Number of simultaneous threads/connections to try.', '20'])
], self.class)
end
@ -98,7 +98,7 @@ class MetasploitModule < Msf::Post
end
end
if client.arch != ARCH_X64 && client.argc != ARCH_X86
unless [ARCH_X64, ARCH_X86].include?(client.arch)
print_error("This module cannot be used without native meterpreter at present")
return
end