Update json for python modules
parent
eb17d9b198
commit
69a785ff46
|
@ -43,9 +43,7 @@ metadata = {
|
|||
'license': 'CORE_LICENSE',
|
||||
'references': [
|
||||
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/GetUserSPNs.py'},
|
||||
{'type': 'url', 'ref': 'https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Dog%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20-%20Tim%20Medin(1).pdf'},
|
||||
{'type': 'aka', 'ref': 'GetUserSPNs.py'},
|
||||
{'type': 'aka', 'ref': 'Kerberoast'}
|
||||
{'type': 'url', 'ref': 'https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Dog%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20-%20Tim%20Medin(1).pdf'}
|
||||
],
|
||||
'type': 'single_scanner',
|
||||
'options': {
|
||||
|
@ -53,6 +51,12 @@ metadata = {
|
|||
'domain': {'type': 'string', 'description': 'The target Active Directory domain', 'required': True, 'default': None},
|
||||
'user': {'type': 'string', 'description': 'Username for a domain account', 'required': True, 'default': None},
|
||||
'pass': {'type': 'string', 'description': 'Password for the domain user account', 'required': True, 'default': None}
|
||||
},
|
||||
'notes': {
|
||||
'AKA': [
|
||||
'GetUserSPNs.py',
|
||||
'Kerberoast'
|
||||
]
|
||||
}}
|
||||
|
||||
class GetUserSPNs:
|
||||
|
|
|
@ -44,8 +44,7 @@ metadata = {
|
|||
'references': [
|
||||
{'type': 'url', 'ref': 'https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/'},
|
||||
{'type': 'url', 'ref': 'https://enigma0x3.net/2017/01/23/lateral-movement-via-dcom-round-2/'},
|
||||
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/dcomexec.py'},
|
||||
{'type': 'aka', 'ref': 'dcomexec.py'},
|
||||
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/dcomexec.py'}
|
||||
],
|
||||
'type': 'single_scanner',
|
||||
'options': {
|
||||
|
@ -55,6 +54,9 @@ metadata = {
|
|||
'SMBDomain': {'type': 'string', 'description': 'The Windows domain to use for authentication', 'required': False, 'default': '.'},
|
||||
'SMBPass': {'type': 'string', 'description': 'The password for the specified username', 'required': True, 'default': None},
|
||||
'SMBUser': {'type': 'string', 'description': 'The username to authenticate as', 'required': True, 'default': None},
|
||||
},
|
||||
'notes': {
|
||||
'AKA': ['dcomexec.py']
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -51,8 +51,7 @@ metadata = {
|
|||
{'type': 'url', 'ref': 'http://www.beginningtoseethelight.org/ntsecurity/index.htm'},
|
||||
{'type': 'url', 'ref': 'http://www.ntdsxtract.com/downloads/ActiveDirectoryOfflineHashDumpAndForensics.pdf'},
|
||||
{'type': 'url', 'ref': 'http://www.passcape.com/index.php?section=blog&cmd=details&id=15'},
|
||||
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py'},
|
||||
{'type': 'aka', 'ref': 'secretsdump.py'},
|
||||
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py'}
|
||||
],
|
||||
'type': 'single_scanner',
|
||||
'options': {
|
||||
|
@ -61,6 +60,9 @@ metadata = {
|
|||
'SMBDomain': {'type': 'string', 'description': 'The Windows domain to use for authentication', 'required': False, 'default': '.'},
|
||||
'SMBPass': {'type': 'string', 'description': 'The password for the specified username', 'required': True, 'default': None},
|
||||
'SMBUser': {'type': 'string', 'description': 'The username to authenticate as', 'required': True, 'default': None},
|
||||
},
|
||||
'notes': {
|
||||
'AKA': ['secretsdump.py']
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -34,8 +34,7 @@ metadata = {
|
|||
'date': '2018-03-19',
|
||||
'license': 'CORE_LICENSE',
|
||||
'references': [
|
||||
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py'},
|
||||
{'type': 'aka', 'ref': 'wmiexec.py'},
|
||||
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py'}
|
||||
],
|
||||
'type': 'single_scanner',
|
||||
'options': {
|
||||
|
@ -44,6 +43,9 @@ metadata = {
|
|||
'SMBDomain': {'type': 'string', 'description': 'The Windows domain to use for authentication', 'required': False, 'default': '.'},
|
||||
'SMBPass': {'type': 'string', 'description': 'The password for the specified username', 'required': True, 'default': None},
|
||||
'SMBUser': {'type': 'string', 'description': 'The username to authenticate as', 'required': True, 'default': None},
|
||||
},
|
||||
'notes': {
|
||||
'AKA': ['wmiexec.py']
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -56,9 +56,7 @@ metadata = {
|
|||
{'type': 'cve', 'ref': '2012-5081'}, # Oracle Java
|
||||
{'type': 'url', 'ref': 'https://robotattack.org'},
|
||||
{'type': 'url', 'ref': 'https://eprint.iacr.org/2017/1189'},
|
||||
{'type': 'url', 'ref': 'https://github.com/robotattackorg/robot-detect'}, # Original PoC
|
||||
{'type': 'aka', 'ref': 'ROBOT'},
|
||||
{'type': 'aka', 'ref': 'Adaptive chosen-ciphertext attack'}
|
||||
{'type': 'url', 'ref': 'https://github.com/robotattackorg/robot-detect'} # Original PoC
|
||||
],
|
||||
'type': 'single_scanner',
|
||||
'options': {
|
||||
|
@ -66,6 +64,12 @@ metadata = {
|
|||
'rport': {'type': 'port', 'description': 'The target port', 'required': True, 'default': 443},
|
||||
'cipher_group': {'type': 'enum', 'description': 'Use TLS_RSA ciphers with AES and 3DES ciphers, or only TLS_RSA_WITH_AES_128_CBC_SHA or TLS-RSA-WITH-AES-128-GCM-SHA256', 'required': True, 'default': 'all', 'values': ['all', 'cbc', 'gcm']},
|
||||
'timeout': {'type': 'int', 'description': 'The delay to wait for TLS responses', 'required': True, 'default': 5}
|
||||
},
|
||||
'notes': {
|
||||
'AKA': [
|
||||
'ROBOT',
|
||||
'Adaptive chosen-ciphertext attack'
|
||||
]
|
||||
}}
|
||||
|
||||
cipher_handshakes = {
|
||||
|
|
|
@ -34,8 +34,7 @@ metadata = {
|
|||
'license': 'MSF_LICENSE',
|
||||
'references': [
|
||||
{'type': 'url', 'ref': 'https://developer.teradata.com/tools/reference/teradata-python-module'},
|
||||
{'type': 'url', 'ref': 'https://downloads.teradata.com/download/connectivity/odbc-driver/linux'},
|
||||
{'type': 'aka', 'ref': 'Teradata ODBC Login Scanner'}
|
||||
{'type': 'url', 'ref': 'https://downloads.teradata.com/download/connectivity/odbc-driver/linux'}
|
||||
],
|
||||
'type': 'single_host_login_scanner',
|
||||
'options': {
|
||||
|
@ -44,7 +43,10 @@ metadata = {
|
|||
'userpass': {'type': 'string', 'description': 'A list of username/password combinations to try', 'required': False},
|
||||
'sleep_interval': {'type': 'float', 'description': 'Time in seconds to wait between login attempts', 'required': False}
|
||||
},
|
||||
'service_name': 'teradata'
|
||||
'service_name': 'teradata',
|
||||
'notes': {
|
||||
'AKA': ['Teradata ODBC Login Scanner']
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
|
|
@ -19,15 +19,19 @@ metadata = {
|
|||
'references': [
|
||||
{'type': 'cve', 'ref': '2017-14117'},
|
||||
{'type': 'url', 'ref': 'https://www.nomotion.net/blog/sharknatto/'},
|
||||
{'type': 'url', 'ref': 'https://blog.rapid7.com/2017/09/07/measuring-sharknat-to-exposures/#vulnerability5port49152tcpexposure'},
|
||||
{'type': 'aka', 'ref': 'SharknAT&To'},
|
||||
{'type': 'aka', 'ref': 'sharknatto'}
|
||||
{'type': 'url', 'ref': 'https://blog.rapid7.com/2017/09/07/measuring-sharknat-to-exposures/#vulnerability5port49152tcpexposure'}
|
||||
],
|
||||
'type': 'multi_scanner',
|
||||
'options': {
|
||||
'rhosts': {'type': 'address_range', 'description': 'The target address', 'required': True, 'default': None},
|
||||
'rport': {'type': 'port', 'description': 'The target port', 'required': True, 'default': 49152},
|
||||
},
|
||||
'notes': {
|
||||
'AKA': [
|
||||
'SharknAT&To',
|
||||
'sharknatto'
|
||||
]
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
|
|
@ -32,7 +32,6 @@ metadata = {
|
|||
'authors': ['xychix <xychix[AT]hotmail.com>', 'smfreegard', 'Adam Cammack <adam_cammack[AT]rapid7.com>'],
|
||||
'date': '2017-01-26',
|
||||
'references': [
|
||||
{'type': 'aka', 'ref': 'Harakiri'},
|
||||
{'type': 'cve', 'ref': '2016-1000282'},
|
||||
{'type': 'edb', 'ref': '41162'},
|
||||
{'type': 'url', 'ref': 'https://github.com/haraka/Haraka/pull/1606'},
|
||||
|
@ -54,6 +53,9 @@ metadata = {
|
|||
'rhost': {'type': 'address', 'description': 'Target server', 'required': True, 'default': None},
|
||||
'rport': {'type': 'port', 'description': 'Target server port', 'required': True, 'default': 25},
|
||||
'command': {'type': 'string', 'description': 'Command to run on the target', 'required': True, 'default': '/bin/echo hello'}
|
||||
},
|
||||
'notes': {
|
||||
'AKA': ['Harakiri']
|
||||
}}
|
||||
|
||||
|
||||
|
|
|
@ -73,8 +73,7 @@ metadata = {
|
|||
{'type': 'cve', 'ref': '2017-0147'},
|
||||
{'type': 'cve', 'ref': '2017-0148'},
|
||||
{'type': 'edb', 'ref': '42030'},
|
||||
{'type': 'url', 'ref': 'https://github.com/worawit/MS17-010'},
|
||||
{'type': 'aka', 'ref': 'ETERNALBLUE'}
|
||||
{'type': 'url', 'ref': 'https://github.com/worawit/MS17-010'}
|
||||
],
|
||||
'date': 'Mar 14 2017',
|
||||
'type': 'remote_exploit',
|
||||
|
@ -93,6 +92,9 @@ metadata = {
|
|||
# Windows 2012 does not allow anonymous to login if no share is accessible.
|
||||
'SMBUser': {'type': 'string', 'description': '(Optional) The username to authenticate as', 'required': False, 'default': ''},
|
||||
'SMBPass': {'type': 'string', 'description': '(Optional) The password for the specified username', 'required': False, 'default': ''}
|
||||
},
|
||||
'notes': {
|
||||
'AKA': ['ETERNALBLUE']
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue