Correct more post modules for naming style consistency

unstable
sinn3r 2012-02-20 13:49:23 -06:00
parent fd283dd95b
commit 779e3cdcda
8 changed files with 8 additions and 8 deletions

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => "Windows Credential Store Enumeration and Decryption Module", 'Name' => "Windows Gather Credential Store Enumeration and Decryption Module",
'Description' => %q{ 'Description' => %q{
This module will enumerate the Microsoft Credential Store and decrypt the This module will enumerate the Microsoft Credential Store and decrypt the
credentials. This module can only access credentials created by the user the credentials. This module can only access credentials created by the user the

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows File and Registry Artifacts Enumeration', 'Name' => 'Windows Gather File and Registry Artifacts Enumeration',
'Description' => %q{ 'Description' => %q{
This module will check the file system and registry for particular artifacts. The This module will check the file system and registry for particular artifacts. The
list of artifacts is read from data/post/enum_artifacts_list.txt or a user specified file. Any list of artifacts is read from data/post/enum_artifacts_list.txt or a user specified file. Any

View File

@ -12,7 +12,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Domain Enumeration', 'Name' => 'Windows Gather Domain Enumeration',
'Description' => %q{ 'Description' => %q{
This module enumerates currently the domains a host can see and the domain This module enumerates currently the domains a host can see and the domain
controllers for that domain. controllers for that domain.

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Terminal Server Client Connection Information Dumper', 'Name' => 'Windows Gather Terminal Server Client Connection Information Dumper',
'Description' => %q{ 'Description' => %q{
This module dumps MRU and connection data for RDP sessions This module dumps MRU and connection data for RDP sessions
}, },

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => 'Windows Certificate Authority Injection', 'Name' => 'Windows Manage Certificate Authority Injection',
'Description' => %q{ 'Description' => %q{
This module allows the attacker to insert an arbitrary CA certificate This module allows the attacker to insert an arbitrary CA certificate
into the victim's Trusted Root store. into the victim's Trusted Root store.

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => 'Windows hosts file injection', 'Name' => 'Windows Manage hosts file injection',
'Description' => %q{ 'Description' => %q{
This module allows the attacker to insert a new entry into the target This module allows the attacker to insert a new entry into the target
system's hosts file. system's hosts file.

View File

@ -13,7 +13,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Local NBD Server for Remote Disks', 'Name' => 'Windows Manage Local NBD Server for Remote Disks',
'Description' => %q{Maps remote disks and logical volumes to a local Network Block 'Description' => %q{Maps remote disks and logical volumes to a local Network Block
Device server. Allows for forensic tools to be executed on the remote disk directly.}, Device server. Allows for forensic tools to be executed on the remote disk directly.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Host File Entry Removal', 'Name' => 'Windows Manage Host File Entry Removal',
'Description' => %q{ 'Description' => %q{
This module allows the attacker to remove an entry from the Windows hosts file. This module allows the attacker to remove an entry from the Windows hosts file.
}, },