Correct more post modules for naming style consistency
parent
fd283dd95b
commit
779e3cdcda
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "Windows Credential Store Enumeration and Decryption Module",
|
||||
'Name' => "Windows Gather Credential Store Enumeration and Decryption Module",
|
||||
'Description' => %q{
|
||||
This module will enumerate the Microsoft Credential Store and decrypt the
|
||||
credentials. This module can only access credentials created by the user the
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows File and Registry Artifacts Enumeration',
|
||||
'Name' => 'Windows Gather File and Registry Artifacts Enumeration',
|
||||
'Description' => %q{
|
||||
This module will check the file system and registry for particular artifacts. The
|
||||
list of artifacts is read from data/post/enum_artifacts_list.txt or a user specified file. Any
|
||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Domain Enumeration',
|
||||
'Name' => 'Windows Gather Domain Enumeration',
|
||||
'Description' => %q{
|
||||
This module enumerates currently the domains a host can see and the domain
|
||||
controllers for that domain.
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Terminal Server Client Connection Information Dumper',
|
||||
'Name' => 'Windows Gather Terminal Server Client Connection Information Dumper',
|
||||
'Description' => %q{
|
||||
This module dumps MRU and connection data for RDP sessions
|
||||
},
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => 'Windows Certificate Authority Injection',
|
||||
'Name' => 'Windows Manage Certificate Authority Injection',
|
||||
'Description' => %q{
|
||||
This module allows the attacker to insert an arbitrary CA certificate
|
||||
into the victim's Trusted Root store.
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => 'Windows hosts file injection',
|
||||
'Name' => 'Windows Manage hosts file injection',
|
||||
'Description' => %q{
|
||||
This module allows the attacker to insert a new entry into the target
|
||||
system's hosts file.
|
||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Local NBD Server for Remote Disks',
|
||||
'Name' => 'Windows Manage Local NBD Server for Remote Disks',
|
||||
'Description' => %q{Maps remote disks and logical volumes to a local Network Block
|
||||
Device server. Allows for forensic tools to be executed on the remote disk directly.},
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Host File Entry Removal',
|
||||
'Name' => 'Windows Manage Host File Entry Removal',
|
||||
'Description' => %q{
|
||||
This module allows the attacker to remove an entry from the Windows hosts file.
|
||||
},
|
||||
|
|
Loading…
Reference in New Issue