From 5e374e1d365159d82e3f225e175383373eff5016 Mon Sep 17 00:00:00 2001 From: David Rude Date: Wed, 27 Apr 2011 16:25:15 +0000 Subject: [PATCH] Post module title changes for consistency git-svn-id: file:///home/svn/framework3/trunk@12455 4d416f70-5f16-0410-b530-b9f4589650da --- modules/post/multi/gather/env.rb | 2 +- modules/post/multi/gather/filezilla_client_cred.rb | 2 +- modules/post/multi/gather/firefox_creds.rb | 2 +- modules/post/multi/gather/multi_command.rb | 2 +- modules/post/multi/gather/pidgin_cred.rb | 2 +- modules/post/multi/gather/run_console_rc_file.rb | 2 +- modules/post/osx/gather/hashdump.rb | 2 +- modules/post/windows/capture/keylog_recorder.rb | 2 +- modules/post/windows/escalate/bypassuac.rb | 2 +- modules/post/windows/escalate/ms10_073_kbdlayout.rb | 2 +- modules/post/windows/escalate/ms10_092_schelevator.rb | 2 +- modules/post/windows/escalate/net_runtime_modify.rb | 2 +- modules/post/windows/escalate/screen_unlock.rb | 2 +- modules/post/windows/escalate/service_permissions.rb | 2 +- modules/post/windows/gather/apple_ios_backup.rb | 2 +- modules/post/windows/gather/arp_scanner.rb | 2 +- modules/post/windows/gather/checkvm.rb | 2 +- modules/post/windows/gather/credential_collector.rb | 2 +- modules/post/windows/gather/dumplinks.rb | 2 +- modules/post/windows/gather/enum_applications.rb | 2 +- modules/post/windows/gather/enum_chrome.rb | 2 +- modules/post/windows/gather/enum_domain_group_users.rb | 2 +- modules/post/windows/gather/enum_logged_on_users.rb | 2 +- modules/post/windows/gather/enum_powershell_env.rb | 2 +- modules/post/windows/gather/enum_shares.rb | 2 +- modules/post/windows/gather/enum_snmp.rb | 2 +- modules/post/windows/gather/enum_vnc_pw.rb | 2 +- modules/post/windows/gather/enum_winscp_pwds.rb | 2 +- modules/post/windows/gather/filezilla_server_cred.rb | 2 +- modules/post/windows/gather/hashdump.rb | 2 +- modules/post/windows/gather/resolve_sid.rb | 2 +- modules/post/windows/gather/screen_spy.rb | 2 +- modules/post/windows/gather/usb_history.rb | 4 ++-- modules/post/windows/manage/autoroute.rb | 2 +- modules/post/windows/manage/delete_user.rb | 2 +- modules/post/windows/manage/enable_rdp.rb | 2 +- modules/post/windows/manage/migrate.rb | 2 +- modules/post/windows/manage/multi_meterpreter_inject.rb | 2 +- 38 files changed, 39 insertions(+), 39 deletions(-) diff --git a/modules/post/multi/gather/env.rb b/modules/post/multi/gather/env.rb index 883984c43a..88368313c0 100644 --- a/modules/post/multi/gather/env.rb +++ b/modules/post/multi/gather/env.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Generic Operating System Environment Settings', + 'Name' => 'Multi Gather Generic Operating System Environment Settings', 'Description' => %q{ This module prints out the operating system environment variables }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez ', 'egypt' ], diff --git a/modules/post/multi/gather/filezilla_client_cred.rb b/modules/post/multi/gather/filezilla_client_cred.rb index 564bfed359..1d3cf13758 100644 --- a/modules/post/multi/gather/filezilla_client_cred.rb +++ b/modules/post/multi/gather/filezilla_client_cred.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info(info, - 'Name' => 'FileZilla FTP Client Credential Collection', + 'Name' => 'Multi Gather FileZilla FTP Client Credential Collection', 'Description' => %q{ This module will collect credentials from the FileZilla FTP client if installed. }, 'License' => MSF_LICENSE, 'Author' => diff --git a/modules/post/multi/gather/firefox_creds.rb b/modules/post/multi/gather/firefox_creds.rb index d77dfe7a3c..ce30a985b9 100644 --- a/modules/post/multi/gather/firefox_creds.rb +++ b/modules/post/multi/gather/firefox_creds.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info(info, - 'Name' => 'Firefox Signon Credential Collection', + 'Name' => 'Multi Gather Firefox Signon Credential Collection', 'Description' => %q{ This module will collect credentials from the Firefox web browser if it is installed on the targeted machine. Additionally, cookies are downloaded. Which diff --git a/modules/post/multi/gather/multi_command.rb b/modules/post/multi/gather/multi_command.rb index c9e8b30b08..b6a4cc1ec6 100644 --- a/modules/post/multi/gather/multi_command.rb +++ b/modules/post/multi/gather/multi_command.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Run Shell Command Resource File', + 'Name' => 'Multi Gather Run Shell Command Resource File', 'Description' => %q{ This module will read shell commands from a resource file and execute the commands in the speciffied Meterpreter or shell session.}, 'License' => MSF_LICENSE, diff --git a/modules/post/multi/gather/pidgin_cred.rb b/modules/post/multi/gather/pidgin_cred.rb index feb88dfe09..ecd6fdf66a 100644 --- a/modules/post/multi/gather/pidgin_cred.rb +++ b/modules/post/multi/gather/pidgin_cred.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info(info, - 'Name' => 'Pidgin Instant Messenger Credential Collection', + 'Name' => 'Multi Gather Pidgin Instant Messenger Credential Collection', 'Description' => %q{ This module will collect credentials from the pidgin IM client if installed. }, 'License' => MSF_LICENSE, 'Author' => diff --git a/modules/post/multi/gather/run_console_rc_file.rb b/modules/post/multi/gather/run_console_rc_file.rb index 0cf08a456f..c979cc429f 100644 --- a/modules/post/multi/gather/run_console_rc_file.rb +++ b/modules/post/multi/gather/run_console_rc_file.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Run Console Resource File', + 'Name' => 'Multi Gather Run Console Resource File', 'Description' => %q{ This module will read console commands from a resource file and execute the commands in the speciffied Meterpreter session.}, 'License' => MSF_LICENSE, diff --git a/modules/post/osx/gather/hashdump.rb b/modules/post/osx/gather/hashdump.rb index d8f08684c3..a4f4c8d48d 100644 --- a/modules/post/osx/gather/hashdump.rb +++ b/modules/post/osx/gather/hashdump.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Mac OS X Password Hash Collector', + 'Name' => 'OS X Gather Mac OS X Password Hash Collector', 'Description' => %q{ This module dumps SHA1, LM and NT Hashes of Mac OS X Tiger, Leopard and Snow Leopard Systems. }, diff --git a/modules/post/windows/capture/keylog_recorder.rb b/modules/post/windows/capture/keylog_recorder.rb index f35fbd92a2..b551e7b6c6 100644 --- a/modules/post/windows/capture/keylog_recorder.rb +++ b/modules/post/windows/capture/keylog_recorder.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Keystroke Recorder', + 'Name' => 'Windows Capture Keystroke Recorder', 'Description' => %q{ This module can be used to capture keystrokes. To capture keystrokes when the session is running as SYSTEM, the MIGRATE option must be enabled and the CAPTURE_TYPE option should be set to one of diff --git a/modules/post/windows/escalate/bypassuac.rb b/modules/post/windows/escalate/bypassuac.rb index 11e6ed5187..f3930d3f6c 100644 --- a/modules/post/windows/escalate/bypassuac.rb +++ b/modules/post/windows/escalate/bypassuac.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows UAC Protection Bypass', + 'Name' => 'Windows Escalate UAC Protection Bypass', 'Description' => %q{ This module will bypass Windows UAC by utilizing the trusted publisher certificate through process injection. It will spawn a second shell that diff --git a/modules/post/windows/escalate/ms10_073_kbdlayout.rb b/modules/post/windows/escalate/ms10_073_kbdlayout.rb index 2d79e79a19..7b77ca8daa 100644 --- a/modules/post/windows/escalate/ms10_073_kbdlayout.rb +++ b/modules/post/windows/escalate/ms10_073_kbdlayout.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super(update_info(info, - 'Name' => 'Microsoft Windows NtUserLoadKeyboardLayoutEx Privilege Escalation', + 'Name' => 'Windows Escalate NtUserLoadKeyboardLayoutEx Privilege Escalation', 'Description' => %q{ This module exploits the keyboard layout vulnerability exploited by Stuxnet. When processing specially crafted keyboard layout files (DLLs), the Windows kernel fails diff --git a/modules/post/windows/escalate/ms10_092_schelevator.rb b/modules/post/windows/escalate/ms10_092_schelevator.rb index 2315be51ed..494904e4ae 100644 --- a/modules/post/windows/escalate/ms10_092_schelevator.rb +++ b/modules/post/windows/escalate/ms10_092_schelevator.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super(update_info(info, - 'Name' => 'Microsoft Windows Vista+ Task Scheduler XML Privilege Escalation', + 'Name' => 'Windows Escalate Task Scheduler XML Privilege Escalation', 'Description' => %q{ This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet. When processing task files, the Windows Task Scheduler only uses a CRC32 diff --git a/modules/post/windows/escalate/net_runtime_modify.rb b/modules/post/windows/escalate/net_runtime_modify.rb index 7cba092d07..0d8f01fdf3 100644 --- a/modules/post/windows/escalate/net_runtime_modify.rb +++ b/modules/post/windows/escalate/net_runtime_modify.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft .NET Runtime Optimization Service Privilege Escalation', + 'Name' => 'Windows Escalate Microsoft .NET Runtime Optimization Service Privilege Escalation', 'Description' => %q{ This module attempts to exploit the security permissions set on the .NET Runtime Optimization service. Vulnerable versions of the .NET Framework include 4.0 and 2.0. diff --git a/modules/post/windows/escalate/screen_unlock.rb b/modules/post/windows/escalate/screen_unlock.rb index 882a856690..7adcd9264a 100644 --- a/modules/post/windows/escalate/screen_unlock.rb +++ b/modules/post/windows/escalate/screen_unlock.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super(update_info(info, - 'Name' => 'Microsoft Windows Locked Desktop Unlocker', + 'Name' => 'Windows Escalate Locked Desktop Unlocker', 'Description' => %q{ This module unlocks a locked Windows desktop by patching the respective code inside the LSASS.exe process. This diff --git a/modules/post/windows/escalate/service_permissions.rb b/modules/post/windows/escalate/service_permissions.rb index 0f9b523431..101d304f3d 100644 --- a/modules/post/windows/escalate/service_permissions.rb +++ b/modules/post/windows/escalate/service_permissions.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post include ::Msf::Post::WindowsServices def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Service Permissions Local Privilege Escalation', + 'Name' => 'Windows Escalate Service Permissions Local Privilege Escalation', 'Description' => %q{ This module attempts to exploit existing administrative privileges to obtain a SYSTEM session. If directly creating a service fails, this module will inspect diff --git a/modules/post/windows/gather/apple_ios_backup.rb b/modules/post/windows/gather/apple_ios_backup.rb index fdab589d6a..b988f08cd7 100644 --- a/modules/post/windows/gather/apple_ios_backup.rb +++ b/modules/post/windows/gather/apple_ios_backup.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info(info, - 'Name' => 'Microsoft Windows Apple iOS MobileSync Backup File Collection', + 'Name' => 'Windows Gather Apple iOS MobileSync Backup File Collection', 'Description' => %q{ This module will collect sensitive files from any on-disk iOS device backups }, 'License' => MSF_LICENSE, 'Author' => diff --git a/modules/post/windows/gather/arp_scanner.rb b/modules/post/windows/gather/arp_scanner.rb index cb8866ffe4..b6845db2d0 100644 --- a/modules/post/windows/gather/arp_scanner.rb +++ b/modules/post/windows/gather/arp_scanner.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'ARP Scanner', + 'Name' => 'Windows Gather ARP Scanner', 'Description' => %q{ This Module will perform an ARP Scan for a given IP range thru a Meterpreter Session.}, 'License' => MSF_LICENSE, diff --git a/modules/post/windows/gather/checkvm.rb b/modules/post/windows/gather/checkvm.rb index 24a813812f..d014a78f5f 100644 --- a/modules/post/windows/gather/checkvm.rb +++ b/modules/post/windows/gather/checkvm.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Virtual Environment Detection', + 'Name' => 'Windows Gather Virtual Environment Detection', 'Description' => %q{ This module attempts to determine whether the system is running inside of a virtual environment and if so, which one. This diff --git a/modules/post/windows/gather/credential_collector.rb b/modules/post/windows/gather/credential_collector.rb index 8cb7b95ec0..c2d47737ff 100644 --- a/modules/post/windows/gather/credential_collector.rb +++ b/modules/post/windows/gather/credential_collector.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Credential Collector', + 'Name' => 'Windows Gather Credential Collector', 'Description' => %q{ This module harvest credentials found on the host and store them in the database.}, 'License' => MSF_LICENSE, 'Author' => [ 'tebo[at]attackresearch.com'], diff --git a/modules/post/windows/gather/dumplinks.rb b/modules/post/windows/gather/dumplinks.rb index 639e6cb364..53f43836fe 100644 --- a/modules/post/windows/gather/dumplinks.rb +++ b/modules/post/windows/gather/dumplinks.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Dump Recent Files lnk Info', + 'Name' => 'Windows Gather Dump Recent Files lnk Info', 'Description' => %q{ "This module will parse .lnk files from user's Recent Documents dumplinks is a modified port of Harlan Carvey's lslnk.pl Perl script. diff --git a/modules/post/windows/gather/enum_applications.rb b/modules/post/windows/gather/enum_applications.rb index 49bfddfaa6..c0e3d57155 100644 --- a/modules/post/windows/gather/enum_applications.rb +++ b/modules/post/windows/gather/enum_applications.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Installed Application Enumeration', + 'Name' => 'Windows Gather Installed Application Enumeration', 'Description' => %q{ This module will enumerate all installed applications }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], diff --git a/modules/post/windows/gather/enum_chrome.rb b/modules/post/windows/gather/enum_chrome.rb index 37bba0c88e..1120b81885 100644 --- a/modules/post/windows/gather/enum_chrome.rb +++ b/modules/post/windows/gather/enum_chrome.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super(update_info(info, - 'Name' => "Google Chrome User Data Enumeration", + 'Name' => "Windows Gather Google Chrome User Data Enumeration", 'Description' => %q{This module will collect user data from Google Chrome, and attempt to decrypt sensitive information}, 'License' => MSF_LICENSE, 'Version' => '$Revision$', diff --git a/modules/post/windows/gather/enum_domain_group_users.rb b/modules/post/windows/gather/enum_domain_group_users.rb index 8445469919..59d7defe4d 100644 --- a/modules/post/windows/gather/enum_domain_group_users.rb +++ b/modules/post/windows/gather/enum_domain_group_users.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Enumerate Domain Group', + 'Name' => 'Windows Gather Enumerate Domain Group', 'Description' => %q{ Extracts user accounts from specified group and stores the results in the loot. Will also verify if session account is in the group. Data is stored in loot in a format that diff --git a/modules/post/windows/gather/enum_logged_on_users.rb b/modules/post/windows/gather/enum_logged_on_users.rb index 1be7a5e988..4b97b7a532 100644 --- a/modules/post/windows/gather/enum_logged_on_users.rb +++ b/modules/post/windows/gather/enum_logged_on_users.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Logged On User Enumeration (Registry)', + 'Name' => 'Windows Gather Logged On User Enumeration (Registry)', 'Description' => %q{ This module will enumerate current and recently logged on Windows users}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], diff --git a/modules/post/windows/gather/enum_powershell_env.rb b/modules/post/windows/gather/enum_powershell_env.rb index 56cbbcc9d5..c1f09095fc 100644 --- a/modules/post/windows/gather/enum_powershell_env.rb +++ b/modules/post/windows/gather/enum_powershell_env.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Powershell Environment Setting Enumeration', + 'Name' => 'Windows Gather Powershell Environment Setting Enumeration', 'Description' => %q{ This module will enumerate Microsoft Powershell settings }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], diff --git a/modules/post/windows/gather/enum_shares.rb b/modules/post/windows/gather/enum_shares.rb index dee2e88741..ac8ae188bc 100644 --- a/modules/post/windows/gather/enum_shares.rb +++ b/modules/post/windows/gather/enum_shares.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows SMB Share Enumeration via Registry', + 'Name' => 'Windows Gather SMB Share Enumeration via Registry', 'Description' => %q{ This module will enumerate configured and recently used file shares}, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez '], diff --git a/modules/post/windows/gather/enum_snmp.rb b/modules/post/windows/gather/enum_snmp.rb index 1ac5656918..5a80028b12 100644 --- a/modules/post/windows/gather/enum_snmp.rb +++ b/modules/post/windows/gather/enum_snmp.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows SNMP Settings Enumeration (Registry)', + 'Name' => 'Windows Gather SNMP Settings Enumeration (Registry)', 'Description' => %q{ This module will enumerate the SNMP service configuration }, 'License' => MSF_LICENSE, 'Author' => [ 'Carlos Perez ', 'Tebo '], diff --git a/modules/post/windows/gather/enum_vnc_pw.rb b/modules/post/windows/gather/enum_vnc_pw.rb index f9ae7046fa..7dad0040d8 100644 --- a/modules/post/windows/gather/enum_vnc_pw.rb +++ b/modules/post/windows/gather/enum_vnc_pw.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'VNC Password Extraction', + 'Name' => 'Windows Gather VNC Password Extraction', 'Description' => %q{ This module extract DES encrypted passwords in known VNC locations }, 'License' => MSF_LICENSE, 'Author' => [ 'Kurt Grutzmacher ','Rob Fuller '], diff --git a/modules/post/windows/gather/enum_winscp_pwds.rb b/modules/post/windows/gather/enum_winscp_pwds.rb index 0f077ed78c..0ad9f2eff8 100644 --- a/modules/post/windows/gather/enum_winscp_pwds.rb +++ b/modules/post/windows/gather/enum_winscp_pwds.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'WinSCP Saved Password Extraction', + 'Name' => 'Windows Gather WinSCP Saved Password Extraction', 'Description' => %q{ This module extracts weakly encrypted saved passwords from WinSCP. It searches for saved sessions in the diff --git a/modules/post/windows/gather/filezilla_server_cred.rb b/modules/post/windows/gather/filezilla_server_cred.rb index c9094243a6..742dfd4ade 100644 --- a/modules/post/windows/gather/filezilla_server_cred.rb +++ b/modules/post/windows/gather/filezilla_server_cred.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info(info, - 'Name' => 'FileZilla FTP Server Credential Collection', + 'Name' => 'Windows Gather FileZilla FTP Server Credential Collection', 'Description' => %q{ This module will collect credentials from the FileZilla FTP server if installed. }, 'License' => MSF_LICENSE, 'Author' => ['bannedit'], diff --git a/modules/post/windows/gather/hashdump.rb b/modules/post/windows/gather/hashdump.rb index e11639b711..e23e8498c3 100644 --- a/modules/post/windows/gather/hashdump.rb +++ b/modules/post/windows/gather/hashdump.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Local User Account Password Hashes (Registry)', + 'Name' => 'Windows Gather Local User Account Password Hashes (Registry)', 'Description' => %q{ This module will dump the local user accounts from the SAM database using the registry }, 'License' => MSF_LICENSE, 'Author' => [ 'hdm' ], diff --git a/modules/post/windows/gather/resolve_sid.rb b/modules/post/windows/gather/resolve_sid.rb index b75b91e458..06ca4c40f8 100644 --- a/modules/post/windows/gather/resolve_sid.rb +++ b/modules/post/windows/gather/resolve_sid.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Local User Account SID Lookup', + 'Name' => 'Windows Gather Local User Account SID Lookup', 'Description' => %q{ This module prints information about a given SID from the perspective of this session }, 'License' => BSD_LICENSE, 'Author' => [ 'chao-mu'], diff --git a/modules/post/windows/gather/screen_spy.rb b/modules/post/windows/gather/screen_spy.rb index bb77a7d83a..d2fc1fcbab 100644 --- a/modules/post/windows/gather/screen_spy.rb +++ b/modules/post/windows/gather/screen_spy.rb @@ -15,7 +15,7 @@ require 'rbconfig' class Metasploit3 < Msf::Post def initialize(info={}) super( update_info(info, - 'Name' => 'Screen Spy', + 'Name' => 'Windows Gather Screen Spy', 'Description' => %q{ This module will incrementally take screenshots of the meterpreter host. This allows for screen spying which can be useful to determine if there is an active diff --git a/modules/post/windows/gather/usb_history.rb b/modules/post/windows/gather/usb_history.rb index d2da26fdb7..5f37523665 100644 --- a/modules/post/windows/gather/usb_history.rb +++ b/modules/post/windows/gather/usb_history.rb @@ -22,8 +22,8 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'USB Drive Histroy', - 'Description' => %q{ This module will enumerate USB Drive hostory on a target host.}, + 'Name' => 'Windows Gather USB Drive History', + 'Description' => %q{ This module will enumerate USB Drive history on a target host.}, 'License' => MSF_LICENSE, 'Author' => [ 'nebulus'], 'Version' => '$Revision$', diff --git a/modules/post/windows/manage/autoroute.rb b/modules/post/windows/manage/autoroute.rb index 08588f5579..60d7c6a199 100644 --- a/modules/post/windows/manage/autoroute.rb +++ b/modules/post/windows/manage/autoroute.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Network Route via Meterpreter Session', + 'Name' => 'Windows Manage Network Route via Meterpreter Session', 'Description' => %q{This module manages session routing via an existing Meterpreter session. It enables other modules to 'pivot' through a compromised host when connecting to the named NETWORK and SUBMASK.}, 'License' => MSF_LICENSE, 'Author' => [ 'todb'], diff --git a/modules/post/windows/manage/delete_user.rb b/modules/post/windows/manage/delete_user.rb index 06a7d124d6..deba4b04e6 100644 --- a/modules/post/windows/manage/delete_user.rb +++ b/modules/post/windows/manage/delete_user.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Local User Account Deletion', + 'Name' => 'Windows Manage Local User Account Deletion', 'Description' => %q{ This module deletes a local user account from the specified server (or local if none given)}, 'License' => BSD_LICENSE, 'Author' => [ 'chao-mu'], diff --git a/modules/post/windows/manage/enable_rdp.rb b/modules/post/windows/manage/enable_rdp.rb index 19a434f7db..7f39b9d002 100644 --- a/modules/post/windows/manage/enable_rdp.rb +++ b/modules/post/windows/manage/enable_rdp.rb @@ -24,7 +24,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Microsoft Windows Enable Remote Desktop', + 'Name' => 'Windows Manage Enable Remote Desktop', 'Description' => %q{ This module enables the Remote Desktop Service. It provides the options to create a Account and configure such account to be a member of the Local Administrator and diff --git a/modules/post/windows/manage/migrate.rb b/modules/post/windows/manage/migrate.rb index 08d7cb986f..8336c1debe 100644 --- a/modules/post/windows/manage/migrate.rb +++ b/modules/post/windows/manage/migrate.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Process Migrate', + 'Name' => 'Windows Manage Process Migration', 'Description' => %q{ This module will migrate a Meterpreter session from one process to another. A given process name can be given to migrate to or the module can spawn one and migrate to that newly spawned process.}, diff --git a/modules/post/windows/manage/multi_meterpreter_inject.rb b/modules/post/windows/manage/multi_meterpreter_inject.rb index 21a36dc8a1..85803d76c8 100644 --- a/modules/post/windows/manage/multi_meterpreter_inject.rb +++ b/modules/post/windows/manage/multi_meterpreter_inject.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post def initialize(info={}) super( update_info( info, - 'Name' => 'Inject in memory multiple payloads', + 'Name' => 'Windows Manage Inject in Memory Multiple Payloads', 'Description' => %q{ This module will inject in to several process a given payload and connecting to a given list of IP Addresses. The module works with a given lists of IP Addresses and