Land #2422 - rm methods peer & rport

Because they're already defined in the HttpClient mixin
bug/bundler_fix
sinn3r 2013-09-30 16:01:59 -05:00
commit 7118f7dc4c
50 changed files with 0 additions and 227 deletions

View File

@ -45,10 +45,6 @@ class Metasploit4 < Msf::Auxiliary
], self.class)
end
def rport
datastore['RPORT']
end
def run_host(ip)
soapenv='http://schemas.xmlsoap.org/soap/envelope/'
soapenvenc='http://schemas.xmlsoap.org/soap/encoding/'

View File

@ -41,10 +41,6 @@ class Metasploit4 < Msf::Auxiliary
register_autofilter_ports([ 50013 ])
end
def rport
datastore['RPORT']
end
def run_host(ip)
# Check version information to confirm Win/Lin

View File

@ -38,14 +38,6 @@ class Metasploit3 < Msf::Auxiliary
end
def rport
datastore['RPORT']
end
def peer
"#{rhost}:#{rport}"
end
def run
record = "<RECORD>"
record << "<NAME>SRS</NAME><OPERATION>4</OPERATION><CMD>7</CMD>" # Operation

View File

@ -50,10 +50,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{datastore['RHOST']}:#{datastore['RPORT']}"
end
def fingerprint(response)
if(response.headers.has_key?('Server') )

View File

@ -41,10 +41,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def execute_php_code(code, opts = {})
param_name = Rex::Text.rand_text_alpha(6)
padding = Rex::Text.rand_text_alpha(6)

View File

@ -47,10 +47,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def get_domain_info(session)
res = send_request_cgi({
'uri' => "/RegWeb/RegWeb/GetDomainControllerServlet",

View File

@ -52,10 +52,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
uri = normalize_uri(target_uri.path)
res = send_request_cgi({

View File

@ -39,10 +39,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def peer
"#{rhost}:#{rport}"
end
def run_host(rhost)
url = normalize_uri(datastore['URI'], '/index.php/members')

View File

@ -48,10 +48,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
@peer = "#{rhost}:#{rport}"
@uri = normalize_uri(target_uri.path)

View File

@ -49,10 +49,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
@peer = "#{rhost}:#{rport}"
@uri = normalize_uri(target_uri.path)

View File

@ -48,10 +48,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
@peer = "#{rhost}:#{rport}"
@uri = normalize_uri(target_uri.path)

View File

@ -37,11 +37,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def anonymous_access?
res = send_request_raw({'uri' => '/'})
return true if res and res.body =~ /username = "hpsmh_anonymous"/

View File

@ -29,10 +29,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def run_host(ip)
tpath = normalize_uri(target_uri.path)
if tpath[-1,1] != '/'

View File

@ -31,10 +31,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def run_host(ip)
tpath = normalize_uri(target_uri.path)
if tpath[-1,1] != '/'

View File

@ -30,10 +30,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def os_fingerprint(response)
if not response.headers.has_key?('Server')
return "Unkown OS (No Server Header)"

View File

@ -56,14 +56,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def peer(rhost)
"#{rhost}:#{rport}"
end
def get_first_session
res = send_request_cgi({
'uri' => normalize_uri(target_uri.to_s, "index.php"),

View File

@ -46,14 +46,6 @@ class Metasploit4 < Msf::Auxiliary
end
def rport
datastore['RPORT']
end
def peer
"#{rhost}:#{rport}"
end
def run_host(ip)
traversal = "..\\" * datastore['DEPTH']

View File

@ -47,14 +47,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def peer
"#{rhost}:#{rport}"
end
def run_host(ip)
record = "<RECORD><NAME>SRS</NAME><OPERATION>4</OPERATION><CMD>103</CMD><PATH>#{datastore['RFILE']}</PATH></RECORD>"

View File

@ -32,10 +32,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def run_host(ip)
File.open(datastore['TARGETURIS'], 'rb').each_line do |line|
test_uri = line.chomp

View File

@ -37,10 +37,6 @@ class Metasploit3 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI'], "/services/listServices"),

View File

@ -51,12 +51,6 @@ class Metasploit3 < Msf::Auxiliary
deregister_options('RHOST')
end
def peer
"#{rhost}:#{rport}"
end
def auth(username, password, sid, last_login)
res = send_request_cgi({
'method' => 'POST',

View File

@ -35,10 +35,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -47,10 +47,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -41,10 +41,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -39,10 +39,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -40,10 +40,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -47,10 +47,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => "/",

View File

@ -70,12 +70,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def check
@cookie = ''

View File

@ -79,10 +79,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def lookup_lhost()
# Get the source address
if datastore['SRVHOST'] == '0.0.0.0'

View File

@ -56,10 +56,6 @@ class Metasploit3 < Msf::Exploit::Remote
return target_uri.path
end
def peer
return "#{rhost}:#{rport}"
end
def check
# Check version
print_status("#{peer} - Trying to detect installed version")

View File

@ -53,12 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
#
# Checks if target is running HavaLite CMS 1.1.7
# We only flag 1.1.7 as vulnerable, because we don't have enough information from

View File

@ -65,10 +65,6 @@ class Metasploit3 < Msf::Exploit::Remote
end
def peer
return "#{rhost}:#{rport}"
end
def check
res = get_upload_form

View File

@ -53,12 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def check
res = send_request_raw({'uri' => normalize_uri(target_uri.path)})
if not res

View File

@ -66,10 +66,6 @@ class Metasploit3 < Msf::Exploit::Remote
return uri
end
def peer
"#{rhost}:#{rport}"
end
def remote_exe(command)
res = send_request_cgi({
'uri' => "#{base}backend.php",

View File

@ -52,10 +52,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def uri
return target_uri.path
end

View File

@ -55,10 +55,6 @@ class Metasploit3 < Msf::Exploit::Remote
return target_uri.path
end
def peer
return "#{rhost}:#{rport}"
end
def check
# Check version
print_status("#{peer} - Trying to detect ZeroShell")

View File

@ -56,12 +56,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def check
res = send_request_raw({'uri' => normalize_uri(target_uri.path)})
if not res

View File

@ -57,10 +57,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def webfolder_uri
begin
u = datastore['WRITEWEBFOLDER']

View File

@ -116,10 +116,6 @@ class Metasploit3 < Msf::Exploit::Remote
return nil
end
def peer
return "#{rhost}:#{rport}"
end
def exploit
print_status("#{peer} - Getting a valid session...")
session = get_session

View File

@ -114,10 +114,6 @@ class Metasploit3 < Msf::Exploit::Remote
return nil
end
def peer
return "#{rhost}:#{rport}"
end
def exploit
print_status("#{peer} - Getting a valid session...")
session = get_session

View File

@ -64,10 +64,6 @@ class Metasploit3 < Msf::Exploit::Remote
end
def peer
"#{rhost}:#{rport}"
end
def check
begin

View File

@ -53,10 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def get_version
version = nil

View File

@ -55,10 +55,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def version_soap
soap = <<-eos
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns="http://www.endeca.com/endeca-server/control/1/0">

View File

@ -92,10 +92,6 @@ class Metasploit3 < Msf::Exploit::Remote
end
def peer
"#{rhost}:#{rport}"
end
def exploit
# In order to save binary data to the file system the payload is written to a .vbs