Correct more post modules for naming style consistency
parent
fd283dd95b
commit
779e3cdcda
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => "Windows Credential Store Enumeration and Decryption Module",
|
'Name' => "Windows Gather Credential Store Enumeration and Decryption Module",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module will enumerate the Microsoft Credential Store and decrypt the
|
This module will enumerate the Microsoft Credential Store and decrypt the
|
||||||
credentials. This module can only access credentials created by the user the
|
credentials. This module can only access credentials created by the user the
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows File and Registry Artifacts Enumeration',
|
'Name' => 'Windows Gather File and Registry Artifacts Enumeration',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module will check the file system and registry for particular artifacts. The
|
This module will check the file system and registry for particular artifacts. The
|
||||||
list of artifacts is read from data/post/enum_artifacts_list.txt or a user specified file. Any
|
list of artifacts is read from data/post/enum_artifacts_list.txt or a user specified file. Any
|
||||||
|
|
|
@ -12,7 +12,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows Domain Enumeration',
|
'Name' => 'Windows Gather Domain Enumeration',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module enumerates currently the domains a host can see and the domain
|
This module enumerates currently the domains a host can see and the domain
|
||||||
controllers for that domain.
|
controllers for that domain.
|
||||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows Terminal Server Client Connection Information Dumper',
|
'Name' => 'Windows Gather Terminal Server Client Connection Information Dumper',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module dumps MRU and connection data for RDP sessions
|
This module dumps MRU and connection data for RDP sessions
|
||||||
},
|
},
|
||||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Windows Certificate Authority Injection',
|
'Name' => 'Windows Manage Certificate Authority Injection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module allows the attacker to insert an arbitrary CA certificate
|
This module allows the attacker to insert an arbitrary CA certificate
|
||||||
into the victim's Trusted Root store.
|
into the victim's Trusted Root store.
|
||||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Windows hosts file injection',
|
'Name' => 'Windows Manage hosts file injection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module allows the attacker to insert a new entry into the target
|
This module allows the attacker to insert a new entry into the target
|
||||||
system's hosts file.
|
system's hosts file.
|
||||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows Local NBD Server for Remote Disks',
|
'Name' => 'Windows Manage Local NBD Server for Remote Disks',
|
||||||
'Description' => %q{Maps remote disks and logical volumes to a local Network Block
|
'Description' => %q{Maps remote disks and logical volumes to a local Network Block
|
||||||
Device server. Allows for forensic tools to be executed on the remote disk directly.},
|
Device server. Allows for forensic tools to be executed on the remote disk directly.},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows Host File Entry Removal',
|
'Name' => 'Windows Manage Host File Entry Removal',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module allows the attacker to remove an entry from the Windows hosts file.
|
This module allows the attacker to remove an entry from the Windows hosts file.
|
||||||
},
|
},
|
||||||
|
|
Loading…
Reference in New Issue