Minor pre-release updates with descriptions

bug/bundler_fix
Tod Beardsley 2014-08-25 13:34:45 -05:00
parent 03a1f4455d
commit 6d9833e32b
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
6 changed files with 19 additions and 14 deletions

View File

@ -19,8 +19,9 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
This module identifies NTP servers which permit "PEER_LIST" queries and
return responses that are larger in size or greater in quantity than
the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests.
the request, allowing remote attackers to cause a distributed, reflected
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>

View File

@ -19,8 +19,9 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
return responses that are larger in size or greater in quantity than
the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests.
the request, allowing remote attackers to cause a distributed, reflected
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>

View File

@ -20,8 +20,9 @@ class Metasploit3 < Msf::Auxiliary
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
respond to REQ_NONCE requests with a response larger than the request,
allowing remote attackers to cause a denial of services (traffic
amplification) via spoofed requests.
allowing remote attackers to cause a distributed, reflected
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>

View File

@ -20,9 +20,10 @@ class Metasploit3 < Msf::Auxiliary
This module identifies NTP servers which permit "reslist" queries and
obtains the list of restrictions placed on various network interfaces,
networks or hosts. The reslist feature allows remote
attackers to cause a denial of service (traffic amplification) via
spoofed requests. The more interfaces, networks or host with specific
restrictions, the greater the amplification.
attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or
traffic amplification) via spoofed requests. The more interfaces, networks
or hosts with specific restrictions, the greater the amplification.
requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>

View File

@ -19,8 +19,9 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
cause a denial of services (traffic amplification) via spoofed requests.
respond to UNSETTRAP requests with multiple packets, allowing remote attackers
to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic
amplification) via spoofed requests.
},
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>