Introduce and use OS matching constants
parent
eda8a90cea
commit
583dab62b2
|
@ -76,6 +76,8 @@ module OperatingSystems
|
|||
end
|
||||
|
||||
module WindowsVersions
|
||||
NINE5 = "95"
|
||||
NINE8 = "98"
|
||||
NT = "NT"
|
||||
XP = "XP"
|
||||
TWOK = "2000"
|
||||
|
@ -89,6 +91,33 @@ module OperatingSystems
|
|||
end
|
||||
|
||||
UNKNOWN = "Unknown"
|
||||
|
||||
module Match
|
||||
WINDOWS = /^(?:Microsoft )?Windows/
|
||||
WINDOWS_95 = /^(?:Microsoft )?Windows 95/
|
||||
WINDOWS_98 = /^(?:Microsoft )?Windows 98/
|
||||
WINDOWS_ME = /^(?:Microsoft )?Windows ME/
|
||||
WINDOWS_NT3 = /^(?:Microsoft )?Windows NT 3/
|
||||
WINDOWS_NT4 = /^(?:Microsoft )?Windows NT 4/
|
||||
WINDOWS_2000 = /^(?:Microsoft )?Windows 2000/
|
||||
WINDOWS_XP = /^(?:Microsoft )?Windows XP/
|
||||
WINDOWS_2003 = /^(?:Microsoft )?Windows 2003/
|
||||
WINDOWS_VISTA = /^(?:Microsoft )?Windows Vista/
|
||||
WINDOWS_2008 = /^(?:Microsoft )?Windows 2008/
|
||||
WINDOWS_7 = /^(?:Microsoft )?Windows 7/
|
||||
WINDOWS_2012 = /^(?:Microsoft )?Windows 2012/
|
||||
WINDOWS_8 = /^(?:Microsoft )?Windows 8/
|
||||
WINDOWS_81 = /^(?:Microsoft )?Windows 8\.1/
|
||||
|
||||
LINUX = /^Linux/i
|
||||
MAC_OSX = /^(Apple )?Mac OS X/
|
||||
FREEBSD = /^FreeBSD/
|
||||
NETBSD = /^NetBSD/
|
||||
OPENBSD = /^OpenBSD/
|
||||
VMWARE = /^VMware/
|
||||
ANDROID = /^(?Google )?Android/
|
||||
APPLE_IOS = /^(?:Apple )?iOS/
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
include Msf::Exploit::Remote::BrowserAutopwn
|
||||
|
||||
autopwn_info({
|
||||
:os_name => "Android",
|
||||
:os_name => OperatingSystems::Match::ANDROID,
|
||||
:arch => ARCH_ARMLE,
|
||||
:javascript => true,
|
||||
:rank => ExcellentRanking,
|
||||
|
@ -66,7 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'DefaultTarget' => 0,
|
||||
'BrowserRequirements' => {
|
||||
:source => 'script',
|
||||
:os_name => 'Android',
|
||||
:os_name => OperatingSystems::Match::ANDROID,
|
||||
:arch => ARCH_ARMLE
|
||||
}
|
||||
))
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_name => HttpClients::FF,
|
||||
# :ua_minver => "3.5",
|
||||
# :ua_maxver => "3.5",
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking, # reliable memory corruption
|
||||
# :vuln_test => nil,
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_name => HttpClients::FF,
|
||||
# :ua_minver => "1.0",
|
||||
# :ua_maxver => "1.7.10",
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking, # reliable memory corruption
|
||||
# :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
autopwn_info({
|
||||
:ua_name => HttpClients::OPERA,
|
||||
:ua_maxver => "9.10",
|
||||
:os_name => [ /^Windows/, /^Mac OS X/, ],
|
||||
:os_name => [ OperatingSystems::Match::WINDOWS, OperatingSystems::Match::MAC_OSX, ],
|
||||
:javascript => true,
|
||||
:rank => ExcellentRanking, # reliable cmd exec, cleans up after itself
|
||||
:vuln_test => nil,
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_name => HttpClients::FF,
|
||||
# :ua_minver => "3.6.16",
|
||||
# :ua_maxver => "3.6.16",
|
||||
# :os_name => 'Mac OS X',
|
||||
# :os_name => OperatingSystems::Match::MAC_OSX,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking,
|
||||
#})
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#autopwn_info({
|
||||
# :ua_name => HttpClients::SAFARI,
|
||||
# :ua_maxver => '2.0.2',
|
||||
# :os_name => [ 'Mac OS X' ],
|
||||
# :os_name => OperatingSystems::Match::MAC_OSX,
|
||||
# :javascript => false,
|
||||
# :rank => ExcellentRanking, # reliable cmd execution
|
||||
# :vuln_test => nil,
|
||||
|
|
|
@ -60,7 +60,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'BrowserRequirements' => {
|
||||
:source => 'script',
|
||||
:ua_name => HttpClients::SAFARI,
|
||||
:os_name => 'Mac OS X',
|
||||
:os_name => OperatingSystems::Match::MAC_OSX,
|
||||
|
||||
# On 10.6.8 (Safari 5.x), a dialog never appears unless the user
|
||||
# has already manually launched the dropped exe
|
||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
include Msf::Exploit::RopDb
|
||||
include Msf::Exploit::Remote::BrowserAutopwn
|
||||
autopwn_info({
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:method => "GetVariable",
|
||||
:classid => "ShockwaveFlash.ShockwaveFlash",
|
||||
:rank => NormalRanking, # reliable memory corruption
|
||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
include Msf::Exploit::Remote::BrowserAutopwn
|
||||
|
||||
autopwn_info({
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:ua_name => HttpClients::IE,
|
||||
:ua_minver => "6.0",
|
||||
:ua_maxver => "8.0",
|
||||
|
|
|
@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:os_name => /^Windows XP/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS_XP,
|
||||
:ua_name => Msf::HttpClients::IE
|
||||
},
|
||||
'Targets' =>
|
||||
|
|
|
@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
:source => /script|headers/i,
|
||||
:clsid => "{09F68A41-2FBE-11D3-8C9D-0008C7D901B6}",
|
||||
:method => "ChooseFilePath",
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
|
@ -55,7 +55,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
'Windows XP with IE 6',
|
||||
{
|
||||
'os_name' => 'Windows XP',
|
||||
'os_name' => OperatingSystems::Match::WINDOWS_XP,
|
||||
'ua_name' => 'MSIE',
|
||||
'ua_ver' => '6.0',
|
||||
'Rop' => false,
|
||||
|
@ -66,7 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
'Windows XP with IE 7',
|
||||
{
|
||||
'os_name' => 'Windows XP',
|
||||
'os_name' => OperatingSystems::Match::WINDOWS_XP,
|
||||
'ua_name' => 'MSIE',
|
||||
'ua_ver' => '7.0',
|
||||
'Rop' => false,
|
||||
|
@ -77,7 +77,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
'Windows XP with IE 8',
|
||||
{
|
||||
'os_name' => 'Windows XP',
|
||||
'os_name' => OperatingSystems::Match::WINDOWS_XP,
|
||||
'ua_name' => 'MSIE',
|
||||
'ua_ver' => '8.0',
|
||||
'Rop' => true,
|
||||
|
@ -88,7 +88,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
'Windows Vista with IE 7',
|
||||
{
|
||||
'os_name' => 'Windows Vista',
|
||||
'os_name' => OperatingSystems::Match::WINDOWS_VISTA,
|
||||
'ua_name' => 'MSIE',
|
||||
'ua_ver' => '7.0',
|
||||
'Rop' => false,
|
||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_name => HttpClients::IE,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking, # reliable memory corruption
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_name => HttpClients::SAFARI,
|
||||
# :ua_maxver => '5.0.1',
|
||||
# :ua_maxver => '5.1.7',
|
||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# # No particular browser. Works on at least IE6 and Firefox 1.5.0.3
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking, # reliable memory corruption
|
||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking, # reliable memory corruption
|
||||
# :vuln_test => nil,
|
||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking
|
||||
#})
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_name => HttpClients::IE,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking,
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
|
||||
# :method => "SetSource",
|
||||
# :rank => NormalRanking
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => "{9E065E4A-BD9D-4547-8F90-985DC62A5591}",
|
||||
# :method => "SetSource",
|
||||
# :rank => NormalRanking
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "7.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => "{94773112-72E8-11D0-A42E-00A024DED613}",
|
||||
# :method => "RegisterSchemaRepoFromFileByDbSet",
|
||||
# :rank => NormalRanking
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => NormalRanking,
|
||||
# :classid => "{88DD90B6-C770-4CFF-B7A4-3AFD16BB8824}",
|
||||
# :method => "ServerResourceVersion"
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "7.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => "{C3B92104-B5A7-11D0-A37F-00A0248F0AF1}",
|
||||
# :method => "SetShapeNodeType",
|
||||
# :rank => NormalRanking
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => Rank,
|
||||
# :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
|
||||
# :method => "WriteFileBinary"
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows XP/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS_XP,
|
||||
# :rank => NormalRanking,
|
||||
# :classid => "{8D9E2CC7-D94B-4977-8510-FB49C361A139}",
|
||||
# :method => "WriteFileString "
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => NormalRanking,
|
||||
# :classid => "{24E04EBF-014D-471F-930E-7654B1193BA9}",
|
||||
# :method => "TabCaption"
|
||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_name => HttpClients::IE,
|
||||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "8.0",
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "8.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => GoodRanking
|
||||
#})
|
||||
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
:ua_minver => "8.0",
|
||||
:ua_maxver => "8.0",
|
||||
:javascript => true,
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:rank => GoodRanking
|
||||
})
|
||||
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# than the max by setting to 6.1 (which doesn't really exist).
|
||||
:ua_maxver => "6.1",
|
||||
:javascript => true,
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:method => [ 'CreateObject', 'GetObject' ],
|
||||
:classid =>
|
||||
[
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => NormalRanking,
|
||||
# :classid => "{3c9dff6f-5cb0-422e-9978-d6405d10718f}",
|
||||
# :method => "InternationalSeparator"
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => Rank,
|
||||
# :classid => "{0F2AAAE3-7E9E-4b64-AB5D-1CA24C6ACB9C}",
|
||||
# :method => "Attachment_Times"
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_name => HttpClients::IE,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking,
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_name => HttpClients::FF,
|
||||
# :ua_minver => "3.6.8",
|
||||
# :ua_maxver => "3.6.11",
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking,
|
||||
# :vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_name => HttpClients::FF,
|
||||
# :ua_minver => "3.6.16",
|
||||
# :ua_maxver => "3.6.16",
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :javascript => true,
|
||||
# :rank => NormalRanking,
|
||||
#})
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
:ua_name => HttpClients::FF,
|
||||
:ua_minver => "3.5",
|
||||
:ua_maxver => "3.6.16",
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:javascript => true,
|
||||
:rank => NormalRanking,
|
||||
:vuln_test => "if (navigator.userAgent.indexOf('Windows NT 5.1') != -1 || navigator.javaEnabled()) { is_vuln = true; }",
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_name => HttpClients::IE,
|
||||
# :ua_minver => "6.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => 'DirectAnimation.PathControl',
|
||||
# :method => 'KeyFrame',
|
||||
# :rank => NormalRanking # reliable memory corruption
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "7.0",
|
||||
# :ua_maxver => "7.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :vuln_test => nil, # no way to test without just trying it
|
||||
#})
|
||||
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "7.0",
|
||||
# :ua_maxver => "7.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :vuln_test => nil, # no way to test without just trying it
|
||||
#})
|
||||
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "7.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :vuln_test => nil, # no way to test without just trying it
|
||||
# :rank => LowRanking # exploitable on ie7/vista
|
||||
#})
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "6.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :vuln_test => nil, # no way to test without just trying it
|
||||
#})
|
||||
|
||||
|
|
|
@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "7.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :vuln_test => nil, # no way to test without just trying it
|
||||
#})
|
||||
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "7.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :vuln_test => nil, # no way to test without just trying it
|
||||
#})
|
||||
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "7.0", # Should be 6
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# # Not strictly a vuln check, but an exploitability check since a
|
||||
# # specific version of .NET is required to make the ROP work.
|
||||
# :vuln_test => "if (/.NET CLR 2\\.0\\.50727/.test(navigator.userAgent)) { is_vuln = true }else{ is_vuln = false }",
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "7.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/
|
||||
# :os_name => OperatingSystems::Match::WINDOWS
|
||||
#})
|
||||
|
||||
def initialize(info={})
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
:ua_minver => "6.0",
|
||||
:ua_maxver => "8.0",
|
||||
:javascript => true,
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:vuln_test => %Q|
|
||||
var v = window.os_detect.getVersion();
|
||||
var os_name = v['os_name'];
|
||||
|
|
|
@ -11,7 +11,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
include Msf::Exploit::Remote::HttpServer::HTML
|
||||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_minver => "8.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :rank => NormalRanking, # reliable memory corruption
|
||||
|
|
|
@ -59,7 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:ua_name => Msf::HttpClients::IE,
|
||||
:silverlight => "true"
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "8.0",
|
||||
# :ua_maxver => "8.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => Rank
|
||||
#})
|
||||
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
:ua_minver => "8.0",
|
||||
:ua_maxver => "8.0",
|
||||
:javascript => true,
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:rank => NormalRanking
|
||||
})
|
||||
|
||||
|
|
|
@ -62,13 +62,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
:source => /script|headers/i,
|
||||
:clsid => "{19916E01-B44E-4E31-94A4-4696DF46157B}",
|
||||
:method => "requiredClaims",
|
||||
:os_name => /^Windows XP/
|
||||
:os_name => OperatingSystems::Match::WINDOWS_XP
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Windows XP with IE 8',
|
||||
{
|
||||
'os_name' => 'Windows XP',
|
||||
'os_name' => OperatingSystems::Match::WINDOWS_XP,
|
||||
'ua_name' => Msf::HttpClients::IE,
|
||||
'ua_ver' => '8.0',
|
||||
'arch' => ARCH_X86
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
:ua_minver => "6.0",
|
||||
:ua_maxver => "9.0",
|
||||
:javascript => true,
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:classid => "{f6D90f11-9c73-11d3-b32e-00C04f990bb4}",
|
||||
:method => "definition",
|
||||
:rank => GoodRanking
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => NormalRanking,
|
||||
# :classid => "{601D7813-408F-11D1-98D7-444553540000}",
|
||||
# :method => "SetEngine"
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
|
||||
# :method => "Check",
|
||||
# :rank => NormalRanking
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "7.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => "{E6ACF817-0A85-4EBE-9F0A-096C6488CFEA}",
|
||||
# :method => "StopModule",
|
||||
# :rank => NormalRanking
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => "{B6FCC215-D303-11D1-BC6C-0000C078797F}",
|
||||
# :method => "SetMarkupMode",
|
||||
# :rank => NormalRanking
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => Rank,
|
||||
# :classid => "{05D96F71-87C6-11D3-9BE4-00902742D6E0}",
|
||||
# :method => "Attachment_Times"
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "9.0",
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => Rank,
|
||||
# :classid => "{5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D}"
|
||||
#})
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# :javascript => true,
|
||||
# :classid => "{C80CAF1F-C58E-11D5-A093-006097ED77E6}",
|
||||
# :method => "ConnectToSynactis",
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :rank => AverageRanking
|
||||
#})
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_name => HttpClients::IE,
|
||||
# :ua_minver => "6.0",
|
||||
# :ua_maxver => "8.0",
|
||||
|
|
|
@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'BrowserRequirements' =>
|
||||
{
|
||||
:source => /script|headers/i,
|
||||
:os_name => /^Windows/,
|
||||
:os_name => OperatingSystems::Match::WINDOWS,
|
||||
:ua_name => /MSIE|KXCLIE/i
|
||||
},
|
||||
'Payload' =>
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#autopwn_info({
|
||||
# :ua_name => HttpClients::IE,
|
||||
# :javascript => true,
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :classid => '{A09AE68F-B14D-43ED-B713-BA413F034904}',
|
||||
# :method => 'CreateNewFolderFromName',
|
||||
# :rank => NormalRanking # reliable memory corruption
|
||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#include Msf::Exploit::Remote::BrowserAutopwn
|
||||
#
|
||||
#autopwn_info({
|
||||
# :os_name => /^Windows/,
|
||||
# :os_name => OperatingSystems::Match::WINDOWS,
|
||||
# :ua_name => HttpClients::IE,
|
||||
# :rank => NormalRanking,
|
||||
# :vuln_test => nil,
|
||||
|
|
Loading…
Reference in New Issue