Post module title changes for consistency

git-svn-id: file:///home/svn/framework3/trunk@12455 4d416f70-5f16-0410-b530-b9f4589650da
unstable
David Rude 2011-04-27 16:25:15 +00:00
parent 46c919cc8a
commit 5e374e1d36
38 changed files with 39 additions and 39 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Generic Operating System Environment Settings', 'Name' => 'Multi Gather Generic Operating System Environment Settings',
'Description' => %q{ This module prints out the operating system environment variables }, 'Description' => %q{ This module prints out the operating system environment variables },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ],

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info(info, super( update_info(info,
'Name' => 'FileZilla FTP Client Credential Collection', 'Name' => 'Multi Gather FileZilla FTP Client Credential Collection',
'Description' => %q{ This module will collect credentials from the FileZilla FTP client if installed. }, 'Description' => %q{ This module will collect credentials from the FileZilla FTP client if installed. },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info(info, super( update_info(info,
'Name' => 'Firefox Signon Credential Collection', 'Name' => 'Multi Gather Firefox Signon Credential Collection',
'Description' => %q{ 'Description' => %q{
This module will collect credentials from the Firefox web browser if it is This module will collect credentials from the Firefox web browser if it is
installed on the targeted machine. Additionally, cookies are downloaded. Which installed on the targeted machine. Additionally, cookies are downloaded. Which

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Run Shell Command Resource File', 'Name' => 'Multi Gather Run Shell Command Resource File',
'Description' => %q{ This module will read shell commands from a resource file and 'Description' => %q{ This module will read shell commands from a resource file and
execute the commands in the speciffied Meterpreter or shell session.}, execute the commands in the speciffied Meterpreter or shell session.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info(info, super( update_info(info,
'Name' => 'Pidgin Instant Messenger Credential Collection', 'Name' => 'Multi Gather Pidgin Instant Messenger Credential Collection',
'Description' => %q{ This module will collect credentials from the pidgin IM client if installed. }, 'Description' => %q{ This module will collect credentials from the pidgin IM client if installed. },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Run Console Resource File', 'Name' => 'Multi Gather Run Console Resource File',
'Description' => %q{ This module will read console commands from a resource file and 'Description' => %q{ This module will read console commands from a resource file and
execute the commands in the speciffied Meterpreter session.}, execute the commands in the speciffied Meterpreter session.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Mac OS X Password Hash Collector', 'Name' => 'OS X Gather Mac OS X Password Hash Collector',
'Description' => %q{ 'Description' => %q{
This module dumps SHA1, LM and NT Hashes of Mac OS X Tiger, Leopard and Snow Leopard Systems. This module dumps SHA1, LM and NT Hashes of Mac OS X Tiger, Leopard and Snow Leopard Systems.
}, },

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Keystroke Recorder', 'Name' => 'Windows Capture Keystroke Recorder',
'Description' => %q{ 'Description' => %q{
This module can be used to capture keystrokes. To capture keystrokes when the session is running This module can be used to capture keystrokes. To capture keystrokes when the session is running
as SYSTEM, the MIGRATE option must be enabled and the CAPTURE_TYPE option should be set to one of as SYSTEM, the MIGRATE option must be enabled and the CAPTURE_TYPE option should be set to one of

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows UAC Protection Bypass', 'Name' => 'Windows Escalate UAC Protection Bypass',
'Description' => %q{ 'Description' => %q{
This module will bypass Windows UAC by utilizing the trusted publisher This module will bypass Windows UAC by utilizing the trusted publisher
certificate through process injection. It will spawn a second shell that certificate through process injection. It will spawn a second shell that

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => 'Microsoft Windows NtUserLoadKeyboardLayoutEx Privilege Escalation', 'Name' => 'Windows Escalate NtUserLoadKeyboardLayoutEx Privilege Escalation',
'Description' => %q{ 'Description' => %q{
This module exploits the keyboard layout vulnerability exploited by Stuxnet. When This module exploits the keyboard layout vulnerability exploited by Stuxnet. When
processing specially crafted keyboard layout files (DLLs), the Windows kernel fails processing specially crafted keyboard layout files (DLLs), the Windows kernel fails

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => 'Microsoft Windows Vista+ Task Scheduler XML Privilege Escalation', 'Name' => 'Windows Escalate Task Scheduler XML Privilege Escalation',
'Description' => %q{ 'Description' => %q{
This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet. This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet.
When processing task files, the Windows Task Scheduler only uses a CRC32 When processing task files, the Windows Task Scheduler only uses a CRC32

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft .NET Runtime Optimization Service Privilege Escalation', 'Name' => 'Windows Escalate Microsoft .NET Runtime Optimization Service Privilege Escalation',
'Description' => %q{ 'Description' => %q{
This module attempts to exploit the security permissions set on the .NET Runtime This module attempts to exploit the security permissions set on the .NET Runtime
Optimization service. Vulnerable versions of the .NET Framework include 4.0 and 2.0. Optimization service. Vulnerable versions of the .NET Framework include 4.0 and 2.0.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => 'Microsoft Windows Locked Desktop Unlocker', 'Name' => 'Windows Escalate Locked Desktop Unlocker',
'Description' => %q{ 'Description' => %q{
This module unlocks a locked Windows desktop by patching This module unlocks a locked Windows desktop by patching
the respective code inside the LSASS.exe process. This the respective code inside the LSASS.exe process. This

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
include ::Msf::Post::WindowsServices include ::Msf::Post::WindowsServices
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Service Permissions Local Privilege Escalation', 'Name' => 'Windows Escalate Service Permissions Local Privilege Escalation',
'Description' => %q{ 'Description' => %q{
This module attempts to exploit existing administrative privileges to obtain This module attempts to exploit existing administrative privileges to obtain
a SYSTEM session. If directly creating a service fails, this module will inspect a SYSTEM session. If directly creating a service fails, this module will inspect

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info(info, super( update_info(info,
'Name' => 'Microsoft Windows Apple iOS MobileSync Backup File Collection', 'Name' => 'Windows Gather Apple iOS MobileSync Backup File Collection',
'Description' => %q{ This module will collect sensitive files from any on-disk iOS device backups }, 'Description' => %q{ This module will collect sensitive files from any on-disk iOS device backups },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'ARP Scanner', 'Name' => 'Windows Gather ARP Scanner',
'Description' => %q{ This Module will perform an ARP Scan for a given IP range thru a 'Description' => %q{ This Module will perform an ARP Scan for a given IP range thru a
Meterpreter Session.}, Meterpreter Session.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Virtual Environment Detection', 'Name' => 'Windows Gather Virtual Environment Detection',
'Description' => %q{ 'Description' => %q{
This module attempts to determine whether the system is running This module attempts to determine whether the system is running
inside of a virtual environment and if so, which one. This inside of a virtual environment and if so, which one. This

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Credential Collector', 'Name' => 'Windows Gather Credential Collector',
'Description' => %q{ This module harvest credentials found on the host and store them in the database.}, 'Description' => %q{ This module harvest credentials found on the host and store them in the database.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'tebo[at]attackresearch.com'], 'Author' => [ 'tebo[at]attackresearch.com'],

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Dump Recent Files lnk Info', 'Name' => 'Windows Gather Dump Recent Files lnk Info',
'Description' => %q{ 'Description' => %q{
"This module will parse .lnk files from user's Recent Documents "This module will parse .lnk files from user's Recent Documents
dumplinks is a modified port of Harlan Carvey's lslnk.pl Perl script. dumplinks is a modified port of Harlan Carvey's lslnk.pl Perl script.

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Installed Application Enumeration', 'Name' => 'Windows Gather Installed Application Enumeration',
'Description' => %q{ This module will enumerate all installed applications }, 'Description' => %q{ This module will enumerate all installed applications },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => "Google Chrome User Data Enumeration", 'Name' => "Windows Gather Google Chrome User Data Enumeration",
'Description' => %q{This module will collect user data from Google Chrome, and attempt to decrypt sensitive information}, 'Description' => %q{This module will collect user data from Google Chrome, and attempt to decrypt sensitive information},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Enumerate Domain Group', 'Name' => 'Windows Gather Enumerate Domain Group',
'Description' => %q{ Extracts user accounts from specified group 'Description' => %q{ Extracts user accounts from specified group
and stores the results in the loot. Will also verify if session and stores the results in the loot. Will also verify if session
account is in the group. Data is stored in loot in a format that account is in the group. Data is stored in loot in a format that

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Logged On User Enumeration (Registry)', 'Name' => 'Windows Gather Logged On User Enumeration (Registry)',
'Description' => %q{ This module will enumerate current and recently logged on Windows users}, 'Description' => %q{ This module will enumerate current and recently logged on Windows users},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Powershell Environment Setting Enumeration', 'Name' => 'Windows Gather Powershell Environment Setting Enumeration',
'Description' => %q{ This module will enumerate Microsoft Powershell settings }, 'Description' => %q{ This module will enumerate Microsoft Powershell settings },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows SMB Share Enumeration via Registry', 'Name' => 'Windows Gather SMB Share Enumeration via Registry',
'Description' => %q{ This module will enumerate configured and recently used file shares}, 'Description' => %q{ This module will enumerate configured and recently used file shares},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows SNMP Settings Enumeration (Registry)', 'Name' => 'Windows Gather SNMP Settings Enumeration (Registry)',
'Description' => %q{ This module will enumerate the SNMP service configuration }, 'Description' => %q{ This module will enumerate the SNMP service configuration },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'],

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'VNC Password Extraction', 'Name' => 'Windows Gather VNC Password Extraction',
'Description' => %q{ This module extract DES encrypted passwords in known VNC locations }, 'Description' => %q{ This module extract DES encrypted passwords in known VNC locations },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Kurt Grutzmacher <grutz@jingojango.net>','Rob Fuller <mubix@hak5.org>'], 'Author' => [ 'Kurt Grutzmacher <grutz@jingojango.net>','Rob Fuller <mubix@hak5.org>'],

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'WinSCP Saved Password Extraction', 'Name' => 'Windows Gather WinSCP Saved Password Extraction',
'Description' => %q{ This module extracts weakly encrypted 'Description' => %q{ This module extracts weakly encrypted
saved passwords from WinSCP. It saved passwords from WinSCP. It
searches for saved sessions in the searches for saved sessions in the

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info(info, super( update_info(info,
'Name' => 'FileZilla FTP Server Credential Collection', 'Name' => 'Windows Gather FileZilla FTP Server Credential Collection',
'Description' => %q{ This module will collect credentials from the FileZilla FTP server if installed. }, 'Description' => %q{ This module will collect credentials from the FileZilla FTP server if installed. },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => ['bannedit'], 'Author' => ['bannedit'],

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Local User Account Password Hashes (Registry)', 'Name' => 'Windows Gather Local User Account Password Hashes (Registry)',
'Description' => %q{ This module will dump the local user accounts from the SAM database using the registry }, 'Description' => %q{ This module will dump the local user accounts from the SAM database using the registry },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'hdm' ], 'Author' => [ 'hdm' ],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Local User Account SID Lookup', 'Name' => 'Windows Gather Local User Account SID Lookup',
'Description' => %q{ This module prints information about a given SID from the perspective of this session }, 'Description' => %q{ This module prints information about a given SID from the perspective of this session },
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'], 'Author' => [ 'chao-mu'],

View File

@ -15,7 +15,7 @@ require 'rbconfig'
class Metasploit3 < Msf::Post class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info(info, super( update_info(info,
'Name' => 'Screen Spy', 'Name' => 'Windows Gather Screen Spy',
'Description' => %q{ 'Description' => %q{
This module will incrementally take screenshots of the meterpreter host. This This module will incrementally take screenshots of the meterpreter host. This
allows for screen spying which can be useful to determine if there is an active allows for screen spying which can be useful to determine if there is an active

View File

@ -22,8 +22,8 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'USB Drive Histroy', 'Name' => 'Windows Gather USB Drive History',
'Description' => %q{ This module will enumerate USB Drive hostory on a target host.}, 'Description' => %q{ This module will enumerate USB Drive history on a target host.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'nebulus'], 'Author' => [ 'nebulus'],
'Version' => '$Revision$', 'Version' => '$Revision$',

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Network Route via Meterpreter Session', 'Name' => 'Windows Manage Network Route via Meterpreter Session',
'Description' => %q{This module manages session routing via an existing Meterpreter session. It enables other modules to 'pivot' through a compromised host when connecting to the named NETWORK and SUBMASK.}, 'Description' => %q{This module manages session routing via an existing Meterpreter session. It enables other modules to 'pivot' through a compromised host when connecting to the named NETWORK and SUBMASK.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'todb'], 'Author' => [ 'todb'],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Local User Account Deletion', 'Name' => 'Windows Manage Local User Account Deletion',
'Description' => %q{ This module deletes a local user account from the specified server (or local if none given)}, 'Description' => %q{ This module deletes a local user account from the specified server (or local if none given)},
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'], 'Author' => [ 'chao-mu'],

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Microsoft Windows Enable Remote Desktop', 'Name' => 'Windows Manage Enable Remote Desktop',
'Description' => %q{ 'Description' => %q{
This module enables the Remote Desktop Service. It provides the options to create This module enables the Remote Desktop Service. It provides the options to create
a Account and configure such account to be a member of the Local Administrator and a Account and configure such account to be a member of the Local Administrator and

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Process Migrate', 'Name' => 'Windows Manage Process Migration',
'Description' => %q{ This module will migrate a Meterpreter session from one process to another. 'Description' => %q{ This module will migrate a Meterpreter session from one process to another.
A given process name can be given to migrate to or the module can spawn one A given process name can be given to migrate to or the module can spawn one
and migrate to that newly spawned process.}, and migrate to that newly spawned process.},

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Inject in memory multiple payloads', 'Name' => 'Windows Manage Inject in Memory Multiple Payloads',
'Description' => %q{ This module will inject in to several process a given 'Description' => %q{ This module will inject in to several process a given
payload and connecting to a given list of IP Addresses. payload and connecting to a given list of IP Addresses.
The module works with a given lists of IP Addresses and The module works with a given lists of IP Addresses and