From 58a074d020402affe14969318657158251b067d4 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Wed, 12 Sep 2018 09:08:59 -0700 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 44f1513029..c74e9a54cf 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -8491,12 +8491,14 @@ "type": "auxiliary", "author": [ "Richard Davy - secureyourit.co.uk", - "Lnk Creation Code by Mubix" + "Lnk Creation Code by Mubix", + "asoto-r7" ], - "description": "This module dependent on the given filename extension creates either\n a .lnk, .scf, .url, desktop.ini file which includes a reference\n to the the specified remote host, causing SMB connections to be initiated\n from any user that views the file.", + "description": "This module dependent on the given filename extension creates either\n a .lnk, .scf, .url, .xml, or desktop.ini file which includes a reference\n to the the specified remote host, causing SMB connections to be initiated\n from any user that views the file.", "references": [ "URL-https://malicious.link/blog/2012/02/11/ms08_068-ms10_046-fun-until-2018", - "URL-https://malicious.link/post/2012/2012-02-19-developing-the-lnk-metasploit-post-module-with-mona/" + "URL-https://malicious.link/post/2012/2012-02-19-developing-the-lnk-metasploit-post-module-with-mona/", + "URL-https://bohops.com/2018/08/04/capturing-netntlm-hashes-with-office-dot-xml-documents/" ], "is_server": false, "is_client": false, @@ -8504,7 +8506,7 @@ "arch": "", "rport": null, "targets": null, - "mod_time": "2018-06-10 21:53:40 +0000", + "mod_time": "2018-09-05 11:51:48 +0000", "path": "/modules/auxiliary/fileformat/multidrop.rb", "is_install_path": true, "ref_name": "fileformat/multidrop",