Post module title changes for consistency

git-svn-id: file:///home/svn/framework3/trunk@12455 4d416f70-5f16-0410-b530-b9f4589650da
unstable
David Rude 2011-04-27 16:25:15 +00:00
parent 46c919cc8a
commit 5e374e1d36
38 changed files with 39 additions and 39 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Generic Operating System Environment Settings',
'Name' => 'Multi Gather Generic Operating System Environment Settings',
'Description' => %q{ This module prints out the operating system environment variables },
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ],

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info(info,
'Name' => 'FileZilla FTP Client Credential Collection',
'Name' => 'Multi Gather FileZilla FTP Client Credential Collection',
'Description' => %q{ This module will collect credentials from the FileZilla FTP client if installed. },
'License' => MSF_LICENSE,
'Author' =>

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info(info,
'Name' => 'Firefox Signon Credential Collection',
'Name' => 'Multi Gather Firefox Signon Credential Collection',
'Description' => %q{
This module will collect credentials from the Firefox web browser if it is
installed on the targeted machine. Additionally, cookies are downloaded. Which

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Run Shell Command Resource File',
'Name' => 'Multi Gather Run Shell Command Resource File',
'Description' => %q{ This module will read shell commands from a resource file and
execute the commands in the speciffied Meterpreter or shell session.},
'License' => MSF_LICENSE,

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info(info,
'Name' => 'Pidgin Instant Messenger Credential Collection',
'Name' => 'Multi Gather Pidgin Instant Messenger Credential Collection',
'Description' => %q{ This module will collect credentials from the pidgin IM client if installed. },
'License' => MSF_LICENSE,
'Author' =>

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Run Console Resource File',
'Name' => 'Multi Gather Run Console Resource File',
'Description' => %q{ This module will read console commands from a resource file and
execute the commands in the speciffied Meterpreter session.},
'License' => MSF_LICENSE,

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Mac OS X Password Hash Collector',
'Name' => 'OS X Gather Mac OS X Password Hash Collector',
'Description' => %q{
This module dumps SHA1, LM and NT Hashes of Mac OS X Tiger, Leopard and Snow Leopard Systems.
},

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Keystroke Recorder',
'Name' => 'Windows Capture Keystroke Recorder',
'Description' => %q{
This module can be used to capture keystrokes. To capture keystrokes when the session is running
as SYSTEM, the MIGRATE option must be enabled and the CAPTURE_TYPE option should be set to one of

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows UAC Protection Bypass',
'Name' => 'Windows Escalate UAC Protection Bypass',
'Description' => %q{
This module will bypass Windows UAC by utilizing the trusted publisher
certificate through process injection. It will spawn a second shell that

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => 'Microsoft Windows NtUserLoadKeyboardLayoutEx Privilege Escalation',
'Name' => 'Windows Escalate NtUserLoadKeyboardLayoutEx Privilege Escalation',
'Description' => %q{
This module exploits the keyboard layout vulnerability exploited by Stuxnet. When
processing specially crafted keyboard layout files (DLLs), the Windows kernel fails

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => 'Microsoft Windows Vista+ Task Scheduler XML Privilege Escalation',
'Name' => 'Windows Escalate Task Scheduler XML Privilege Escalation',
'Description' => %q{
This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet.
When processing task files, the Windows Task Scheduler only uses a CRC32

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft .NET Runtime Optimization Service Privilege Escalation',
'Name' => 'Windows Escalate Microsoft .NET Runtime Optimization Service Privilege Escalation',
'Description' => %q{
This module attempts to exploit the security permissions set on the .NET Runtime
Optimization service. Vulnerable versions of the .NET Framework include 4.0 and 2.0.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => 'Microsoft Windows Locked Desktop Unlocker',
'Name' => 'Windows Escalate Locked Desktop Unlocker',
'Description' => %q{
This module unlocks a locked Windows desktop by patching
the respective code inside the LSASS.exe process. This

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
include ::Msf::Post::WindowsServices
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Service Permissions Local Privilege Escalation',
'Name' => 'Windows Escalate Service Permissions Local Privilege Escalation',
'Description' => %q{
This module attempts to exploit existing administrative privileges to obtain
a SYSTEM session. If directly creating a service fails, this module will inspect

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info(info,
'Name' => 'Microsoft Windows Apple iOS MobileSync Backup File Collection',
'Name' => 'Windows Gather Apple iOS MobileSync Backup File Collection',
'Description' => %q{ This module will collect sensitive files from any on-disk iOS device backups },
'License' => MSF_LICENSE,
'Author' =>

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'ARP Scanner',
'Name' => 'Windows Gather ARP Scanner',
'Description' => %q{ This Module will perform an ARP Scan for a given IP range thru a
Meterpreter Session.},
'License' => MSF_LICENSE,

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Virtual Environment Detection',
'Name' => 'Windows Gather Virtual Environment Detection',
'Description' => %q{
This module attempts to determine whether the system is running
inside of a virtual environment and if so, which one. This

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Credential Collector',
'Name' => 'Windows Gather Credential Collector',
'Description' => %q{ This module harvest credentials found on the host and store them in the database.},
'License' => MSF_LICENSE,
'Author' => [ 'tebo[at]attackresearch.com'],

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Dump Recent Files lnk Info',
'Name' => 'Windows Gather Dump Recent Files lnk Info',
'Description' => %q{
"This module will parse .lnk files from user's Recent Documents
dumplinks is a modified port of Harlan Carvey's lslnk.pl Perl script.

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Installed Application Enumeration',
'Name' => 'Windows Gather Installed Application Enumeration',
'Description' => %q{ This module will enumerate all installed applications },
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => "Google Chrome User Data Enumeration",
'Name' => "Windows Gather Google Chrome User Data Enumeration",
'Description' => %q{This module will collect user data from Google Chrome, and attempt to decrypt sensitive information},
'License' => MSF_LICENSE,
'Version' => '$Revision$',

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Enumerate Domain Group',
'Name' => 'Windows Gather Enumerate Domain Group',
'Description' => %q{ Extracts user accounts from specified group
and stores the results in the loot. Will also verify if session
account is in the group. Data is stored in loot in a format that

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Logged On User Enumeration (Registry)',
'Name' => 'Windows Gather Logged On User Enumeration (Registry)',
'Description' => %q{ This module will enumerate current and recently logged on Windows users},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Powershell Environment Setting Enumeration',
'Name' => 'Windows Gather Powershell Environment Setting Enumeration',
'Description' => %q{ This module will enumerate Microsoft Powershell settings },
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows SMB Share Enumeration via Registry',
'Name' => 'Windows Gather SMB Share Enumeration via Registry',
'Description' => %q{ This module will enumerate configured and recently used file shares},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows SNMP Settings Enumeration (Registry)',
'Name' => 'Windows Gather SNMP Settings Enumeration (Registry)',
'Description' => %q{ This module will enumerate the SNMP service configuration },
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'],

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'VNC Password Extraction',
'Name' => 'Windows Gather VNC Password Extraction',
'Description' => %q{ This module extract DES encrypted passwords in known VNC locations },
'License' => MSF_LICENSE,
'Author' => [ 'Kurt Grutzmacher <grutz@jingojango.net>','Rob Fuller <mubix@hak5.org>'],

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'WinSCP Saved Password Extraction',
'Name' => 'Windows Gather WinSCP Saved Password Extraction',
'Description' => %q{ This module extracts weakly encrypted
saved passwords from WinSCP. It
searches for saved sessions in the

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info(info,
'Name' => 'FileZilla FTP Server Credential Collection',
'Name' => 'Windows Gather FileZilla FTP Server Credential Collection',
'Description' => %q{ This module will collect credentials from the FileZilla FTP server if installed. },
'License' => MSF_LICENSE,
'Author' => ['bannedit'],

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Local User Account Password Hashes (Registry)',
'Name' => 'Windows Gather Local User Account Password Hashes (Registry)',
'Description' => %q{ This module will dump the local user accounts from the SAM database using the registry },
'License' => MSF_LICENSE,
'Author' => [ 'hdm' ],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Local User Account SID Lookup',
'Name' => 'Windows Gather Local User Account SID Lookup',
'Description' => %q{ This module prints information about a given SID from the perspective of this session },
'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'],

View File

@ -15,7 +15,7 @@ require 'rbconfig'
class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info(info,
'Name' => 'Screen Spy',
'Name' => 'Windows Gather Screen Spy',
'Description' => %q{
This module will incrementally take screenshots of the meterpreter host. This
allows for screen spying which can be useful to determine if there is an active

View File

@ -22,8 +22,8 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'USB Drive Histroy',
'Description' => %q{ This module will enumerate USB Drive hostory on a target host.},
'Name' => 'Windows Gather USB Drive History',
'Description' => %q{ This module will enumerate USB Drive history on a target host.},
'License' => MSF_LICENSE,
'Author' => [ 'nebulus'],
'Version' => '$Revision$',

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Network Route via Meterpreter Session',
'Name' => 'Windows Manage Network Route via Meterpreter Session',
'Description' => %q{This module manages session routing via an existing Meterpreter session. It enables other modules to 'pivot' through a compromised host when connecting to the named NETWORK and SUBMASK.},
'License' => MSF_LICENSE,
'Author' => [ 'todb'],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Local User Account Deletion',
'Name' => 'Windows Manage Local User Account Deletion',
'Description' => %q{ This module deletes a local user account from the specified server (or local if none given)},
'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'],

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Microsoft Windows Enable Remote Desktop',
'Name' => 'Windows Manage Enable Remote Desktop',
'Description' => %q{
This module enables the Remote Desktop Service. It provides the options to create
a Account and configure such account to be a member of the Local Administrator and

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Process Migrate',
'Name' => 'Windows Manage Process Migration',
'Description' => %q{ This module will migrate a Meterpreter session from one process to another.
A given process name can be given to migrate to or the module can spawn one
and migrate to that newly spawned process.},

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Inject in memory multiple payloads',
'Name' => 'Windows Manage Inject in Memory Multiple Payloads',
'Description' => %q{ This module will inject in to several process a given
payload and connecting to a given list of IP Addresses.
The module works with a given lists of IP Addresses and