Correct more post modules for naming style consistency

unstable
sinn3r 2012-02-20 13:49:23 -06:00
parent fd283dd95b
commit 779e3cdcda
8 changed files with 8 additions and 8 deletions

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => "Windows Credential Store Enumeration and Decryption Module",
'Name' => "Windows Gather Credential Store Enumeration and Decryption Module",
'Description' => %q{
This module will enumerate the Microsoft Credential Store and decrypt the
credentials. This module can only access credentials created by the user the

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows File and Registry Artifacts Enumeration',
'Name' => 'Windows Gather File and Registry Artifacts Enumeration',
'Description' => %q{
This module will check the file system and registry for particular artifacts. The
list of artifacts is read from data/post/enum_artifacts_list.txt or a user specified file. Any

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Domain Enumeration',
'Name' => 'Windows Gather Domain Enumeration',
'Description' => %q{
This module enumerates currently the domains a host can see and the domain
controllers for that domain.

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Terminal Server Client Connection Information Dumper',
'Name' => 'Windows Gather Terminal Server Client Connection Information Dumper',
'Description' => %q{
This module dumps MRU and connection data for RDP sessions
},

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => 'Windows Certificate Authority Injection',
'Name' => 'Windows Manage Certificate Authority Injection',
'Description' => %q{
This module allows the attacker to insert an arbitrary CA certificate
into the victim's Trusted Root store.

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => 'Windows hosts file injection',
'Name' => 'Windows Manage hosts file injection',
'Description' => %q{
This module allows the attacker to insert a new entry into the target
system's hosts file.

View File

@ -13,7 +13,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Local NBD Server for Remote Disks',
'Name' => 'Windows Manage Local NBD Server for Remote Disks',
'Description' => %q{Maps remote disks and logical volumes to a local Network Block
Device server. Allows for forensic tools to be executed on the remote disk directly.},
'License' => MSF_LICENSE,

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Host File Entry Removal',
'Name' => 'Windows Manage Host File Entry Removal',
'Description' => %q{
This module allows the attacker to remove an entry from the Windows hosts file.
},