Post module title changes for consistency
git-svn-id: file:///home/svn/framework3/trunk@12455 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
46c919cc8a
commit
5e374e1d36
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Generic Operating System Environment Settings',
|
'Name' => 'Multi Gather Generic Operating System Environment Settings',
|
||||||
'Description' => %q{ This module prints out the operating system environment variables },
|
'Description' => %q{ This module prints out the operating system environment variables },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ],
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ],
|
||||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info(info,
|
super( update_info(info,
|
||||||
'Name' => 'FileZilla FTP Client Credential Collection',
|
'Name' => 'Multi Gather FileZilla FTP Client Credential Collection',
|
||||||
'Description' => %q{ This module will collect credentials from the FileZilla FTP client if installed. },
|
'Description' => %q{ This module will collect credentials from the FileZilla FTP client if installed. },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info(info,
|
super( update_info(info,
|
||||||
'Name' => 'Firefox Signon Credential Collection',
|
'Name' => 'Multi Gather Firefox Signon Credential Collection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module will collect credentials from the Firefox web browser if it is
|
This module will collect credentials from the Firefox web browser if it is
|
||||||
installed on the targeted machine. Additionally, cookies are downloaded. Which
|
installed on the targeted machine. Additionally, cookies are downloaded. Which
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Run Shell Command Resource File',
|
'Name' => 'Multi Gather Run Shell Command Resource File',
|
||||||
'Description' => %q{ This module will read shell commands from a resource file and
|
'Description' => %q{ This module will read shell commands from a resource file and
|
||||||
execute the commands in the speciffied Meterpreter or shell session.},
|
execute the commands in the speciffied Meterpreter or shell session.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info(info,
|
super( update_info(info,
|
||||||
'Name' => 'Pidgin Instant Messenger Credential Collection',
|
'Name' => 'Multi Gather Pidgin Instant Messenger Credential Collection',
|
||||||
'Description' => %q{ This module will collect credentials from the pidgin IM client if installed. },
|
'Description' => %q{ This module will collect credentials from the pidgin IM client if installed. },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Run Console Resource File',
|
'Name' => 'Multi Gather Run Console Resource File',
|
||||||
'Description' => %q{ This module will read console commands from a resource file and
|
'Description' => %q{ This module will read console commands from a resource file and
|
||||||
execute the commands in the speciffied Meterpreter session.},
|
execute the commands in the speciffied Meterpreter session.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Mac OS X Password Hash Collector',
|
'Name' => 'OS X Gather Mac OS X Password Hash Collector',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module dumps SHA1, LM and NT Hashes of Mac OS X Tiger, Leopard and Snow Leopard Systems.
|
This module dumps SHA1, LM and NT Hashes of Mac OS X Tiger, Leopard and Snow Leopard Systems.
|
||||||
},
|
},
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Keystroke Recorder',
|
'Name' => 'Windows Capture Keystroke Recorder',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module can be used to capture keystrokes. To capture keystrokes when the session is running
|
This module can be used to capture keystrokes. To capture keystrokes when the session is running
|
||||||
as SYSTEM, the MIGRATE option must be enabled and the CAPTURE_TYPE option should be set to one of
|
as SYSTEM, the MIGRATE option must be enabled and the CAPTURE_TYPE option should be set to one of
|
||||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows UAC Protection Bypass',
|
'Name' => 'Windows Escalate UAC Protection Bypass',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module will bypass Windows UAC by utilizing the trusted publisher
|
This module will bypass Windows UAC by utilizing the trusted publisher
|
||||||
certificate through process injection. It will spawn a second shell that
|
certificate through process injection. It will spawn a second shell that
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Microsoft Windows NtUserLoadKeyboardLayoutEx Privilege Escalation',
|
'Name' => 'Windows Escalate NtUserLoadKeyboardLayoutEx Privilege Escalation',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits the keyboard layout vulnerability exploited by Stuxnet. When
|
This module exploits the keyboard layout vulnerability exploited by Stuxnet. When
|
||||||
processing specially crafted keyboard layout files (DLLs), the Windows kernel fails
|
processing specially crafted keyboard layout files (DLLs), the Windows kernel fails
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Microsoft Windows Vista+ Task Scheduler XML Privilege Escalation',
|
'Name' => 'Windows Escalate Task Scheduler XML Privilege Escalation',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet.
|
This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet.
|
||||||
When processing task files, the Windows Task Scheduler only uses a CRC32
|
When processing task files, the Windows Task Scheduler only uses a CRC32
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft .NET Runtime Optimization Service Privilege Escalation',
|
'Name' => 'Windows Escalate Microsoft .NET Runtime Optimization Service Privilege Escalation',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module attempts to exploit the security permissions set on the .NET Runtime
|
This module attempts to exploit the security permissions set on the .NET Runtime
|
||||||
Optimization service. Vulnerable versions of the .NET Framework include 4.0 and 2.0.
|
Optimization service. Vulnerable versions of the .NET Framework include 4.0 and 2.0.
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Microsoft Windows Locked Desktop Unlocker',
|
'Name' => 'Windows Escalate Locked Desktop Unlocker',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module unlocks a locked Windows desktop by patching
|
This module unlocks a locked Windows desktop by patching
|
||||||
the respective code inside the LSASS.exe process. This
|
the respective code inside the LSASS.exe process. This
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
include ::Msf::Post::WindowsServices
|
include ::Msf::Post::WindowsServices
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Service Permissions Local Privilege Escalation',
|
'Name' => 'Windows Escalate Service Permissions Local Privilege Escalation',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module attempts to exploit existing administrative privileges to obtain
|
This module attempts to exploit existing administrative privileges to obtain
|
||||||
a SYSTEM session. If directly creating a service fails, this module will inspect
|
a SYSTEM session. If directly creating a service fails, this module will inspect
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info(info,
|
super( update_info(info,
|
||||||
'Name' => 'Microsoft Windows Apple iOS MobileSync Backup File Collection',
|
'Name' => 'Windows Gather Apple iOS MobileSync Backup File Collection',
|
||||||
'Description' => %q{ This module will collect sensitive files from any on-disk iOS device backups },
|
'Description' => %q{ This module will collect sensitive files from any on-disk iOS device backups },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'ARP Scanner',
|
'Name' => 'Windows Gather ARP Scanner',
|
||||||
'Description' => %q{ This Module will perform an ARP Scan for a given IP range thru a
|
'Description' => %q{ This Module will perform an ARP Scan for a given IP range thru a
|
||||||
Meterpreter Session.},
|
Meterpreter Session.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Virtual Environment Detection',
|
'Name' => 'Windows Gather Virtual Environment Detection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module attempts to determine whether the system is running
|
This module attempts to determine whether the system is running
|
||||||
inside of a virtual environment and if so, which one. This
|
inside of a virtual environment and if so, which one. This
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Credential Collector',
|
'Name' => 'Windows Gather Credential Collector',
|
||||||
'Description' => %q{ This module harvest credentials found on the host and store them in the database.},
|
'Description' => %q{ This module harvest credentials found on the host and store them in the database.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'tebo[at]attackresearch.com'],
|
'Author' => [ 'tebo[at]attackresearch.com'],
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Dump Recent Files lnk Info',
|
'Name' => 'Windows Gather Dump Recent Files lnk Info',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
"This module will parse .lnk files from user's Recent Documents
|
"This module will parse .lnk files from user's Recent Documents
|
||||||
dumplinks is a modified port of Harlan Carvey's lslnk.pl Perl script.
|
dumplinks is a modified port of Harlan Carvey's lslnk.pl Perl script.
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Installed Application Enumeration',
|
'Name' => 'Windows Gather Installed Application Enumeration',
|
||||||
'Description' => %q{ This module will enumerate all installed applications },
|
'Description' => %q{ This module will enumerate all installed applications },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => "Google Chrome User Data Enumeration",
|
'Name' => "Windows Gather Google Chrome User Data Enumeration",
|
||||||
'Description' => %q{This module will collect user data from Google Chrome, and attempt to decrypt sensitive information},
|
'Description' => %q{This module will collect user data from Google Chrome, and attempt to decrypt sensitive information},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Enumerate Domain Group',
|
'Name' => 'Windows Gather Enumerate Domain Group',
|
||||||
'Description' => %q{ Extracts user accounts from specified group
|
'Description' => %q{ Extracts user accounts from specified group
|
||||||
and stores the results in the loot. Will also verify if session
|
and stores the results in the loot. Will also verify if session
|
||||||
account is in the group. Data is stored in loot in a format that
|
account is in the group. Data is stored in loot in a format that
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Logged On User Enumeration (Registry)',
|
'Name' => 'Windows Gather Logged On User Enumeration (Registry)',
|
||||||
'Description' => %q{ This module will enumerate current and recently logged on Windows users},
|
'Description' => %q{ This module will enumerate current and recently logged on Windows users},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Powershell Environment Setting Enumeration',
|
'Name' => 'Windows Gather Powershell Environment Setting Enumeration',
|
||||||
'Description' => %q{ This module will enumerate Microsoft Powershell settings },
|
'Description' => %q{ This module will enumerate Microsoft Powershell settings },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows SMB Share Enumeration via Registry',
|
'Name' => 'Windows Gather SMB Share Enumeration via Registry',
|
||||||
'Description' => %q{ This module will enumerate configured and recently used file shares},
|
'Description' => %q{ This module will enumerate configured and recently used file shares},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows SNMP Settings Enumeration (Registry)',
|
'Name' => 'Windows Gather SNMP Settings Enumeration (Registry)',
|
||||||
'Description' => %q{ This module will enumerate the SNMP service configuration },
|
'Description' => %q{ This module will enumerate the SNMP service configuration },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'],
|
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'],
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'VNC Password Extraction',
|
'Name' => 'Windows Gather VNC Password Extraction',
|
||||||
'Description' => %q{ This module extract DES encrypted passwords in known VNC locations },
|
'Description' => %q{ This module extract DES encrypted passwords in known VNC locations },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Kurt Grutzmacher <grutz@jingojango.net>','Rob Fuller <mubix@hak5.org>'],
|
'Author' => [ 'Kurt Grutzmacher <grutz@jingojango.net>','Rob Fuller <mubix@hak5.org>'],
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'WinSCP Saved Password Extraction',
|
'Name' => 'Windows Gather WinSCP Saved Password Extraction',
|
||||||
'Description' => %q{ This module extracts weakly encrypted
|
'Description' => %q{ This module extracts weakly encrypted
|
||||||
saved passwords from WinSCP. It
|
saved passwords from WinSCP. It
|
||||||
searches for saved sessions in the
|
searches for saved sessions in the
|
||||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info(info,
|
super( update_info(info,
|
||||||
'Name' => 'FileZilla FTP Server Credential Collection',
|
'Name' => 'Windows Gather FileZilla FTP Server Credential Collection',
|
||||||
'Description' => %q{ This module will collect credentials from the FileZilla FTP server if installed. },
|
'Description' => %q{ This module will collect credentials from the FileZilla FTP server if installed. },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => ['bannedit'],
|
'Author' => ['bannedit'],
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Local User Account Password Hashes (Registry)',
|
'Name' => 'Windows Gather Local User Account Password Hashes (Registry)',
|
||||||
'Description' => %q{ This module will dump the local user accounts from the SAM database using the registry },
|
'Description' => %q{ This module will dump the local user accounts from the SAM database using the registry },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'hdm' ],
|
'Author' => [ 'hdm' ],
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Local User Account SID Lookup',
|
'Name' => 'Windows Gather Local User Account SID Lookup',
|
||||||
'Description' => %q{ This module prints information about a given SID from the perspective of this session },
|
'Description' => %q{ This module prints information about a given SID from the perspective of this session },
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Author' => [ 'chao-mu'],
|
'Author' => [ 'chao-mu'],
|
||||||
|
|
|
@ -15,7 +15,7 @@ require 'rbconfig'
|
||||||
class Metasploit3 < Msf::Post
|
class Metasploit3 < Msf::Post
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info(info,
|
super( update_info(info,
|
||||||
'Name' => 'Screen Spy',
|
'Name' => 'Windows Gather Screen Spy',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module will incrementally take screenshots of the meterpreter host. This
|
This module will incrementally take screenshots of the meterpreter host. This
|
||||||
allows for screen spying which can be useful to determine if there is an active
|
allows for screen spying which can be useful to determine if there is an active
|
||||||
|
|
|
@ -22,8 +22,8 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'USB Drive Histroy',
|
'Name' => 'Windows Gather USB Drive History',
|
||||||
'Description' => %q{ This module will enumerate USB Drive hostory on a target host.},
|
'Description' => %q{ This module will enumerate USB Drive history on a target host.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'nebulus'],
|
'Author' => [ 'nebulus'],
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Network Route via Meterpreter Session',
|
'Name' => 'Windows Manage Network Route via Meterpreter Session',
|
||||||
'Description' => %q{This module manages session routing via an existing Meterpreter session. It enables other modules to 'pivot' through a compromised host when connecting to the named NETWORK and SUBMASK.},
|
'Description' => %q{This module manages session routing via an existing Meterpreter session. It enables other modules to 'pivot' through a compromised host when connecting to the named NETWORK and SUBMASK.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'todb'],
|
'Author' => [ 'todb'],
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Local User Account Deletion',
|
'Name' => 'Windows Manage Local User Account Deletion',
|
||||||
'Description' => %q{ This module deletes a local user account from the specified server (or local if none given)},
|
'Description' => %q{ This module deletes a local user account from the specified server (or local if none given)},
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Author' => [ 'chao-mu'],
|
'Author' => [ 'chao-mu'],
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Microsoft Windows Enable Remote Desktop',
|
'Name' => 'Windows Manage Enable Remote Desktop',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module enables the Remote Desktop Service. It provides the options to create
|
This module enables the Remote Desktop Service. It provides the options to create
|
||||||
a Account and configure such account to be a member of the Local Administrator and
|
a Account and configure such account to be a member of the Local Administrator and
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Process Migrate',
|
'Name' => 'Windows Manage Process Migration',
|
||||||
'Description' => %q{ This module will migrate a Meterpreter session from one process to another.
|
'Description' => %q{ This module will migrate a Meterpreter session from one process to another.
|
||||||
A given process name can be given to migrate to or the module can spawn one
|
A given process name can be given to migrate to or the module can spawn one
|
||||||
and migrate to that newly spawned process.},
|
and migrate to that newly spawned process.},
|
||||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Inject in memory multiple payloads',
|
'Name' => 'Windows Manage Inject in Memory Multiple Payloads',
|
||||||
'Description' => %q{ This module will inject in to several process a given
|
'Description' => %q{ This module will inject in to several process a given
|
||||||
payload and connecting to a given list of IP Addresses.
|
payload and connecting to a given list of IP Addresses.
|
||||||
The module works with a given lists of IP Addresses and
|
The module works with a given lists of IP Addresses and
|
||||||
|
|
Loading…
Reference in New Issue