Introduce and use OS matching constants

bug/bundler_fix
HD Moore 2014-05-28 14:35:22 -05:00
parent eda8a90cea
commit 583dab62b2
63 changed files with 97 additions and 68 deletions

View File

@ -76,6 +76,8 @@ module OperatingSystems
end
module WindowsVersions
NINE5 = "95"
NINE8 = "98"
NT = "NT"
XP = "XP"
TWOK = "2000"
@ -89,6 +91,33 @@ module OperatingSystems
end
UNKNOWN = "Unknown"
module Match
WINDOWS = /^(?:Microsoft )?Windows/
WINDOWS_95 = /^(?:Microsoft )?Windows 95/
WINDOWS_98 = /^(?:Microsoft )?Windows 98/
WINDOWS_ME = /^(?:Microsoft )?Windows ME/
WINDOWS_NT3 = /^(?:Microsoft )?Windows NT 3/
WINDOWS_NT4 = /^(?:Microsoft )?Windows NT 4/
WINDOWS_2000 = /^(?:Microsoft )?Windows 2000/
WINDOWS_XP = /^(?:Microsoft )?Windows XP/
WINDOWS_2003 = /^(?:Microsoft )?Windows 2003/
WINDOWS_VISTA = /^(?:Microsoft )?Windows Vista/
WINDOWS_2008 = /^(?:Microsoft )?Windows 2008/
WINDOWS_7 = /^(?:Microsoft )?Windows 7/
WINDOWS_2012 = /^(?:Microsoft )?Windows 2012/
WINDOWS_8 = /^(?:Microsoft )?Windows 8/
WINDOWS_81 = /^(?:Microsoft )?Windows 8\.1/
LINUX = /^Linux/i
MAC_OSX = /^(Apple )?Mac OS X/
FREEBSD = /^FreeBSD/
NETBSD = /^NetBSD/
OPENBSD = /^OpenBSD/
VMWARE = /^VMware/
ANDROID = /^(?Google )?Android/
APPLE_IOS = /^(?:Apple )?iOS/
end
end
end

View File

@ -11,7 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => "Android",
:os_name => OperatingSystems::Match::ANDROID,
:arch => ARCH_ARMLE,
:javascript => true,
:rank => ExcellentRanking,
@ -66,7 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
'DefaultTarget' => 0,
'BrowserRequirements' => {
:source => 'script',
:os_name => 'Android',
:os_name => OperatingSystems::Match::ANDROID,
:arch => ARCH_ARMLE
}
))

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_name => HttpClients::FF,
# :ua_minver => "3.5",
# :ua_maxver => "3.5",
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => nil,

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_name => HttpClients::FF,
# :ua_minver => "1.0",
# :ua_maxver => "1.7.10",
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
autopwn_info({
:ua_name => HttpClients::OPERA,
:ua_maxver => "9.10",
:os_name => [ /^Windows/, /^Mac OS X/, ],
:os_name => [ OperatingSystems::Match::WINDOWS, OperatingSystems::Match::MAC_OSX, ],
:javascript => true,
:rank => ExcellentRanking, # reliable cmd exec, cleans up after itself
:vuln_test => nil,

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_name => HttpClients::FF,
# :ua_minver => "3.6.16",
# :ua_maxver => "3.6.16",
# :os_name => 'Mac OS X',
# :os_name => OperatingSystems::Match::MAC_OSX,
# :javascript => true,
# :rank => NormalRanking,
#})

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
#autopwn_info({
# :ua_name => HttpClients::SAFARI,
# :ua_maxver => '2.0.2',
# :os_name => [ 'Mac OS X' ],
# :os_name => OperatingSystems::Match::MAC_OSX,
# :javascript => false,
# :rank => ExcellentRanking, # reliable cmd execution
# :vuln_test => nil,

View File

@ -60,7 +60,7 @@ class Metasploit3 < Msf::Exploit::Remote
'BrowserRequirements' => {
:source => 'script',
:ua_name => HttpClients::SAFARI,
:os_name => 'Mac OS X',
:os_name => OperatingSystems::Match::MAC_OSX,
# On 10.6.8 (Safari 5.x), a dialog never appears unless the user
# has already manually launched the dropped exe

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::RopDb
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:method => "GetVariable",
:classid => "ShockwaveFlash.ShockwaveFlash",
:rank => NormalRanking, # reliable memory corruption

View File

@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::BrowserAutopwn
autopwn_info({
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:ua_name => HttpClients::IE,
:ua_minver => "6.0",
:ua_maxver => "8.0",

View File

@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
'BrowserRequirements' =>
{
:source => /script|headers/i,
:os_name => /^Windows XP/,
:os_name => OperatingSystems::Match::WINDOWS_XP,
:ua_name => Msf::HttpClients::IE
},
'Targets' =>

View File

@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
:source => /script|headers/i,
:clsid => "{09F68A41-2FBE-11D3-8C9D-0008C7D901B6}",
:method => "ChooseFilePath",
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
},
'Targets' =>
[
@ -55,7 +55,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Windows XP with IE 6',
{
'os_name' => 'Windows XP',
'os_name' => OperatingSystems::Match::WINDOWS_XP,
'ua_name' => 'MSIE',
'ua_ver' => '6.0',
'Rop' => false,
@ -66,7 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Windows XP with IE 7',
{
'os_name' => 'Windows XP',
'os_name' => OperatingSystems::Match::WINDOWS_XP,
'ua_name' => 'MSIE',
'ua_ver' => '7.0',
'Rop' => false,
@ -77,7 +77,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Windows XP with IE 8',
{
'os_name' => 'Windows XP',
'os_name' => OperatingSystems::Match::WINDOWS_XP,
'ua_name' => 'MSIE',
'ua_ver' => '8.0',
'Rop' => true,
@ -88,7 +88,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Windows Vista with IE 7',
{
'os_name' => 'Windows Vista',
'os_name' => OperatingSystems::Match::WINDOWS_VISTA,
'ua_name' => 'MSIE',
'ua_ver' => '7.0',
'Rop' => false,

View File

@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_name => HttpClients::IE,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_name => HttpClients::SAFARI,
# :ua_maxver => '5.0.1',
# :ua_maxver => '5.1.7',

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# # No particular browser. Works on at least IE6 and Firefox 1.5.0.3
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption

View File

@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => nil,

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :javascript => true,
# :rank => NormalRanking
#})

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_name => HttpClients::IE,
# :javascript => true,
# :rank => NormalRanking,

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
# :method => "SetSource",
# :rank => NormalRanking

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
# :method => "SetSource",
# :rank => NormalRanking

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "7.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => "{94773112-72E8-11D0-A42E-00A024DED613}",
# :method => "RegisterSchemaRepoFromFileByDbSet",
# :rank => NormalRanking

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => NormalRanking,
# :classid => "{88DD90B6-C770-4CFF-B7A4-3AFD16BB8824}",
# :method => "ServerResourceVersion"

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "7.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => "{C3B92104-B5A7-11D0-A37F-00A0248F0AF1}",
# :method => "SetShapeNodeType",
# :rank => NormalRanking

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => Rank,
# :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
# :method => "WriteFileBinary"

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows XP/,
# :os_name => OperatingSystems::Match::WINDOWS_XP,
# :rank => NormalRanking,
# :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
# :method => "WriteFileString "

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => NormalRanking,
# :classid => "{24E04EBF-014D-471F-930E-7654B1193BA9}",
# :method => "TabCaption"

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_name => HttpClients::IE,
# :ua_minver => "6.0",
# :ua_maxver => "8.0",

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "8.0",
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => GoodRanking
#})

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_minver => "8.0",
:ua_maxver => "8.0",
:javascript => true,
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:rank => GoodRanking
})

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
# than the max by setting to 6.1 (which doesn't really exist).
:ua_maxver => "6.1",
:javascript => true,
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:method => [ 'CreateObject', 'GetObject' ],
:classid =>
[

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => NormalRanking,
# :classid => "{3c9dff6f-5cb0-422e-9978-d6405d10718f}",
# :method => "InternationalSeparator"

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => Rank,
# :classid => "{0F2AAAE3-7E9E-4b64-AB5D-1CA24C6ACB9C}",
# :method => "Attachment_Times"

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_name => HttpClients::IE,
# :javascript => true,
# :rank => NormalRanking,

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_name => HttpClients::FF,
# :ua_minver => "3.6.8",
# :ua_maxver => "3.6.11",
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :javascript => true,
# :rank => NormalRanking,
# :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_name => HttpClients::FF,
# :ua_minver => "3.6.16",
# :ua_maxver => "3.6.16",
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :javascript => true,
# :rank => NormalRanking,
#})

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_name => HttpClients::FF,
:ua_minver => "3.5",
:ua_maxver => "3.6.16",
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:javascript => true,
:rank => NormalRanking,
:vuln_test => "if (navigator.userAgent.indexOf('Windows NT 5.1') != -1 || navigator.javaEnabled()) { is_vuln = true; }",

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_name => HttpClients::IE,
# :ua_minver => "6.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => 'DirectAnimation.PathControl',
# :method => 'KeyFrame',
# :rank => NormalRanking # reliable memory corruption

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "7.0",
# :ua_maxver => "7.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :vuln_test => nil, # no way to test without just trying it
#})

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "7.0",
# :ua_maxver => "7.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :vuln_test => nil, # no way to test without just trying it
#})

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "7.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :vuln_test => nil, # no way to test without just trying it
# :rank => LowRanking # exploitable on ie7/vista
#})

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "6.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :vuln_test => nil, # no way to test without just trying it
#})

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "7.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :vuln_test => nil, # no way to test without just trying it
#})

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "7.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :vuln_test => nil, # no way to test without just trying it
#})

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "7.0", # Should be 6
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# # Not strictly a vuln check, but an exploitability check since a
# # specific version of .NET is required to make the ROP work.
# :vuln_test => "if (/.NET CLR 2\\.0\\.50727/.test(navigator.userAgent)) { is_vuln = true }else{ is_vuln = false }",

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "7.0",
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows/
# :os_name => OperatingSystems::Match::WINDOWS
#})
def initialize(info={})

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_minver => "6.0",
:ua_maxver => "8.0",
:javascript => true,
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:vuln_test => %Q|
var v = window.os_detect.getVersion();
var os_name = v['os_name'];

View File

@ -11,7 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpServer::HTML
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_minver => "8.0",
# :ua_maxver => "8.0",
# :rank => NormalRanking, # reliable memory corruption

View File

@ -59,7 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote
'BrowserRequirements' =>
{
:source => /script|headers/i,
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:ua_name => Msf::HttpClients::IE,
:silverlight => "true"
},

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "8.0",
# :ua_maxver => "8.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => Rank
#})

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_minver => "8.0",
:ua_maxver => "8.0",
:javascript => true,
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:rank => NormalRanking
})

View File

@ -62,13 +62,13 @@ class Metasploit3 < Msf::Exploit::Remote
:source => /script|headers/i,
:clsid => "{19916E01-B44E-4E31-94A4-4696DF46157B}",
:method => "requiredClaims",
:os_name => /^Windows XP/
:os_name => OperatingSystems::Match::WINDOWS_XP
},
'Targets' =>
[
[ 'Windows XP with IE 8',
{
'os_name' => 'Windows XP',
'os_name' => OperatingSystems::Match::WINDOWS_XP,
'ua_name' => Msf::HttpClients::IE,
'ua_ver' => '8.0',
'arch' => ARCH_X86

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
:ua_minver => "6.0",
:ua_maxver => "9.0",
:javascript => true,
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:classid => "{f6D90f11-9c73-11d3-b32e-00C04f990bb4}",
:method => "definition",
:rank => GoodRanking

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => NormalRanking,
# :classid => "{601D7813-408F-11D1-98D7-444553540000}",
# :method => "SetEngine"

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
# :method => "Check",
# :rank => NormalRanking

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "7.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
# :method => "StopModule",
# :rank => NormalRanking

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => "{B6FCC215-D303-11D1-BC6C-0000C078797F}",
# :method => "SetMarkupMode",
# :rank => NormalRanking

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => Rank,
# :classid => "{05D96F71-87C6-11D3-9BE4-00902742D6E0}",
# :method => "Attachment_Times"

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :ua_minver => "6.0",
# :ua_maxver => "9.0",
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => Rank,
# :classid => "{5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D}"
#})

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
# :javascript => true,
# :classid => "{C80CAF1F-C58E-11D5-A093-006097ED77E6}",
# :method => "ConnectToSynactis",
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :rank => AverageRanking
#})

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_name => HttpClients::IE,
# :ua_minver => "6.0",
# :ua_maxver => "8.0",

View File

@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
'BrowserRequirements' =>
{
:source => /script|headers/i,
:os_name => /^Windows/,
:os_name => OperatingSystems::Match::WINDOWS,
:ua_name => /MSIE|KXCLIE/i
},
'Payload' =>

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
#autopwn_info({
# :ua_name => HttpClients::IE,
# :javascript => true,
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :classid => '{A09AE68F-B14D-43ED-B713-BA413F034904}',
# :method => 'CreateNewFolderFromName',
# :rank => NormalRanking # reliable memory corruption

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
#include Msf::Exploit::Remote::BrowserAutopwn
#
#autopwn_info({
# :os_name => /^Windows/,
# :os_name => OperatingSystems::Match::WINDOWS,
# :ua_name => HttpClients::IE,
# :rank => NormalRanking,
# :vuln_test => nil,