Land #2869, pre-release title/desc fixes
commit
61b30e8b60
|
@ -33,8 +33,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Name' => "SerComm Device Configuration Dump",
|
||||
'Description' => %q{
|
||||
This module will dump the configuration of several SerComm devices. These devices
|
||||
typically include routers from NetGear and Linksys. This module has been tested
|
||||
successfully on
|
||||
typically include routers from NetGear and Linksys. This module was tested
|
||||
successfully against the NetGear DG834 series ADSL modem router.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
|
@ -17,7 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module will cause remote code execution on several SerComm devices.
|
||||
These devices typically include routers from NetGear and Linksys.
|
||||
Tested against NetGear DG834.
|
||||
This module was tested successfully against the NetGear DG834 series
|
||||
ADSL modem router.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
|
@ -12,12 +12,11 @@ module Metasploit3
|
|||
|
||||
def initialize(info={})
|
||||
super(merge_info(info,
|
||||
'Name' => 'Firefox XPCOM execute command',
|
||||
'Name' => 'Firefox XPCOM Execute Command',
|
||||
'Description' => %Q|
|
||||
Runs a shell command on the OS. Never touches the disk.
|
||||
|
||||
This module runs a shell command on the target OS withough touching the disk.
|
||||
On Windows, this command will flash the command prompt momentarily.
|
||||
You can avoid this by setting WSCRIPT to true, which drops a jscript
|
||||
This can be avoided by setting WSCRIPT to true, which drops a jscript
|
||||
"launcher" to disk that hides the prompt.
|
||||
|,
|
||||
'Author' => ['joev'],
|
||||
|
|
|
@ -16,7 +16,7 @@ module Metasploit3
|
|||
def initialize(info = {})
|
||||
super(merge_info(info,
|
||||
'Name' => 'Command Shell, Bind TCP (via Firefox XPCOM script)',
|
||||
'Description' => 'Creates an interactive shell via Javascript with access to Firefox\'s XPCOM API',
|
||||
'Description' => %q{Creates an interactive shell via Javascript with access to Firefox's XPCOM API},
|
||||
'Author' => ['joev'],
|
||||
'License' => BSD_LICENSE,
|
||||
'Platform' => 'firefox',
|
||||
|
|
|
@ -16,7 +16,7 @@ module Metasploit3
|
|||
def initialize(info={})
|
||||
super(merge_info(info,
|
||||
'Name' => 'Command Shell, Reverse TCP (via Firefox XPCOM script)',
|
||||
'Description' => 'Creates an interactive shell via Javascript with access to Firefox\'s XPCOM API',
|
||||
'Description' => %q{Creates an interactive shell via Javascript with access to Firefox's XPCOM API},
|
||||
'Author' => ['joev'],
|
||||
'License' => BSD_LICENSE,
|
||||
'Platform' => 'firefox',
|
||||
|
|
|
@ -16,8 +16,8 @@ class Metasploit3 < Msf::Post
|
|||
'Name' => 'Firefox XSS',
|
||||
'Description' => %q{
|
||||
This module runs the provided SCRIPT as javascript in the
|
||||
origin of the provided URL. It works by navigating a hidden
|
||||
ChromeWindow to the URL, then injecting the SCRIPT with Function.
|
||||
origin of the provided URL. It works by navigating to a hidden
|
||||
ChromeWindow to the URL, then injecting the SCRIPT with Function().
|
||||
The callback "send(result)" is used to send data back to the listener.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
Loading…
Reference in New Issue