Update json for python modules

GSoC/Meterpreter_Web_Console
Erin Bleiweiss 2018-08-27 16:06:07 -05:00
parent eb17d9b198
commit 69a785ff46
No known key found for this signature in database
GPG Key ID: F69B2138BD594660
9 changed files with 45 additions and 21 deletions

View File

@ -43,9 +43,7 @@ metadata = {
'license': 'CORE_LICENSE',
'references': [
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/GetUserSPNs.py'},
{'type': 'url', 'ref': 'https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Dog%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20-%20Tim%20Medin(1).pdf'},
{'type': 'aka', 'ref': 'GetUserSPNs.py'},
{'type': 'aka', 'ref': 'Kerberoast'}
{'type': 'url', 'ref': 'https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Dog%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20-%20Tim%20Medin(1).pdf'}
],
'type': 'single_scanner',
'options': {
@ -53,6 +51,12 @@ metadata = {
'domain': {'type': 'string', 'description': 'The target Active Directory domain', 'required': True, 'default': None},
'user': {'type': 'string', 'description': 'Username for a domain account', 'required': True, 'default': None},
'pass': {'type': 'string', 'description': 'Password for the domain user account', 'required': True, 'default': None}
},
'notes': {
'AKA': [
'GetUserSPNs.py',
'Kerberoast'
]
}}
class GetUserSPNs:

View File

@ -44,8 +44,7 @@ metadata = {
'references': [
{'type': 'url', 'ref': 'https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/'},
{'type': 'url', 'ref': 'https://enigma0x3.net/2017/01/23/lateral-movement-via-dcom-round-2/'},
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/dcomexec.py'},
{'type': 'aka', 'ref': 'dcomexec.py'},
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/dcomexec.py'}
],
'type': 'single_scanner',
'options': {
@ -55,6 +54,9 @@ metadata = {
'SMBDomain': {'type': 'string', 'description': 'The Windows domain to use for authentication', 'required': False, 'default': '.'},
'SMBPass': {'type': 'string', 'description': 'The password for the specified username', 'required': True, 'default': None},
'SMBUser': {'type': 'string', 'description': 'The username to authenticate as', 'required': True, 'default': None},
},
'notes': {
'AKA': ['dcomexec.py']
}
}

View File

@ -51,8 +51,7 @@ metadata = {
{'type': 'url', 'ref': 'http://www.beginningtoseethelight.org/ntsecurity/index.htm'},
{'type': 'url', 'ref': 'http://www.ntdsxtract.com/downloads/ActiveDirectoryOfflineHashDumpAndForensics.pdf'},
{'type': 'url', 'ref': 'http://www.passcape.com/index.php?section=blog&cmd=details&id=15'},
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py'},
{'type': 'aka', 'ref': 'secretsdump.py'},
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py'}
],
'type': 'single_scanner',
'options': {
@ -61,6 +60,9 @@ metadata = {
'SMBDomain': {'type': 'string', 'description': 'The Windows domain to use for authentication', 'required': False, 'default': '.'},
'SMBPass': {'type': 'string', 'description': 'The password for the specified username', 'required': True, 'default': None},
'SMBUser': {'type': 'string', 'description': 'The username to authenticate as', 'required': True, 'default': None},
},
'notes': {
'AKA': ['secretsdump.py']
}
}

View File

@ -34,8 +34,7 @@ metadata = {
'date': '2018-03-19',
'license': 'CORE_LICENSE',
'references': [
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py'},
{'type': 'aka', 'ref': 'wmiexec.py'},
{'type': 'url', 'ref': 'https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py'}
],
'type': 'single_scanner',
'options': {
@ -44,6 +43,9 @@ metadata = {
'SMBDomain': {'type': 'string', 'description': 'The Windows domain to use for authentication', 'required': False, 'default': '.'},
'SMBPass': {'type': 'string', 'description': 'The password for the specified username', 'required': True, 'default': None},
'SMBUser': {'type': 'string', 'description': 'The username to authenticate as', 'required': True, 'default': None},
},
'notes': {
'AKA': ['wmiexec.py']
}
}

View File

@ -56,9 +56,7 @@ metadata = {
{'type': 'cve', 'ref': '2012-5081'}, # Oracle Java
{'type': 'url', 'ref': 'https://robotattack.org'},
{'type': 'url', 'ref': 'https://eprint.iacr.org/2017/1189'},
{'type': 'url', 'ref': 'https://github.com/robotattackorg/robot-detect'}, # Original PoC
{'type': 'aka', 'ref': 'ROBOT'},
{'type': 'aka', 'ref': 'Adaptive chosen-ciphertext attack'}
{'type': 'url', 'ref': 'https://github.com/robotattackorg/robot-detect'} # Original PoC
],
'type': 'single_scanner',
'options': {
@ -66,6 +64,12 @@ metadata = {
'rport': {'type': 'port', 'description': 'The target port', 'required': True, 'default': 443},
'cipher_group': {'type': 'enum', 'description': 'Use TLS_RSA ciphers with AES and 3DES ciphers, or only TLS_RSA_WITH_AES_128_CBC_SHA or TLS-RSA-WITH-AES-128-GCM-SHA256', 'required': True, 'default': 'all', 'values': ['all', 'cbc', 'gcm']},
'timeout': {'type': 'int', 'description': 'The delay to wait for TLS responses', 'required': True, 'default': 5}
},
'notes': {
'AKA': [
'ROBOT',
'Adaptive chosen-ciphertext attack'
]
}}
cipher_handshakes = {

View File

@ -34,8 +34,7 @@ metadata = {
'license': 'MSF_LICENSE',
'references': [
{'type': 'url', 'ref': 'https://developer.teradata.com/tools/reference/teradata-python-module'},
{'type': 'url', 'ref': 'https://downloads.teradata.com/download/connectivity/odbc-driver/linux'},
{'type': 'aka', 'ref': 'Teradata ODBC Login Scanner'}
{'type': 'url', 'ref': 'https://downloads.teradata.com/download/connectivity/odbc-driver/linux'}
],
'type': 'single_host_login_scanner',
'options': {
@ -44,7 +43,10 @@ metadata = {
'userpass': {'type': 'string', 'description': 'A list of username/password combinations to try', 'required': False},
'sleep_interval': {'type': 'float', 'description': 'Time in seconds to wait between login attempts', 'required': False}
},
'service_name': 'teradata'
'service_name': 'teradata',
'notes': {
'AKA': ['Teradata ODBC Login Scanner']
}
}

View File

@ -19,15 +19,19 @@ metadata = {
'references': [
{'type': 'cve', 'ref': '2017-14117'},
{'type': 'url', 'ref': 'https://www.nomotion.net/blog/sharknatto/'},
{'type': 'url', 'ref': 'https://blog.rapid7.com/2017/09/07/measuring-sharknat-to-exposures/#vulnerability5port49152tcpexposure'},
{'type': 'aka', 'ref': 'SharknAT&To'},
{'type': 'aka', 'ref': 'sharknatto'}
{'type': 'url', 'ref': 'https://blog.rapid7.com/2017/09/07/measuring-sharknat-to-exposures/#vulnerability5port49152tcpexposure'}
],
'type': 'multi_scanner',
'options': {
'rhosts': {'type': 'address_range', 'description': 'The target address', 'required': True, 'default': None},
'rport': {'type': 'port', 'description': 'The target port', 'required': True, 'default': 49152},
},
'notes': {
'AKA': [
'SharknAT&To',
'sharknatto'
]
}
}

View File

@ -32,7 +32,6 @@ metadata = {
'authors': ['xychix <xychix[AT]hotmail.com>', 'smfreegard', 'Adam Cammack <adam_cammack[AT]rapid7.com>'],
'date': '2017-01-26',
'references': [
{'type': 'aka', 'ref': 'Harakiri'},
{'type': 'cve', 'ref': '2016-1000282'},
{'type': 'edb', 'ref': '41162'},
{'type': 'url', 'ref': 'https://github.com/haraka/Haraka/pull/1606'},
@ -54,6 +53,9 @@ metadata = {
'rhost': {'type': 'address', 'description': 'Target server', 'required': True, 'default': None},
'rport': {'type': 'port', 'description': 'Target server port', 'required': True, 'default': 25},
'command': {'type': 'string', 'description': 'Command to run on the target', 'required': True, 'default': '/bin/echo hello'}
},
'notes': {
'AKA': ['Harakiri']
}}

View File

@ -73,8 +73,7 @@ metadata = {
{'type': 'cve', 'ref': '2017-0147'},
{'type': 'cve', 'ref': '2017-0148'},
{'type': 'edb', 'ref': '42030'},
{'type': 'url', 'ref': 'https://github.com/worawit/MS17-010'},
{'type': 'aka', 'ref': 'ETERNALBLUE'}
{'type': 'url', 'ref': 'https://github.com/worawit/MS17-010'}
],
'date': 'Mar 14 2017',
'type': 'remote_exploit',
@ -93,6 +92,9 @@ metadata = {
# Windows 2012 does not allow anonymous to login if no share is accessible.
'SMBUser': {'type': 'string', 'description': '(Optional) The username to authenticate as', 'required': False, 'default': ''},
'SMBPass': {'type': 'string', 'description': '(Optional) The password for the specified username', 'required': False, 'default': ''}
},
'notes': {
'AKA': ['ETERNALBLUE']
}
}