diff --git a/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb b/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb index 152480c425..a36010c407 100644 --- a/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb +++ b/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb @@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote June 30th 2011 and July 1st 2011 according to the most recent information available. This backdoor was removed on July 3rd 2011. }, - 'Author' => [ 'hdm', 'mc' ], + 'Author' => [ 'hdm', 'MC' ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'References' => diff --git a/modules/exploits/windows/browser/trendmicro_extsetowner.rb b/modules/exploits/windows/browser/trendmicro_extsetowner.rb index 185702fc32..8d05ba4c29 100644 --- a/modules/exploits/windows/browser/trendmicro_extsetowner.rb +++ b/modules/exploits/windows/browser/trendmicro_extsetowner.rb @@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote an attacker may be able to execute arbitrary code. }, 'License' => MSF_LICENSE, - 'Author' => [ 'Trancer [ 'Trancer ' ], 'Version' => '$Revision$', 'References' => [ diff --git a/modules/exploits/windows/http/xampp_webdav_upload_php.rb b/modules/exploits/windows/http/xampp_webdav_upload_php.rb index 32bdd08032..63ba23e015 100644 --- a/modules/exploits/windows/http/xampp_webdav_upload_php.rb +++ b/modules/exploits/windows/http/xampp_webdav_upload_php.rb @@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote It uses supplied credentials to upload a PHP payload and execute it. }, - 'Author' => ['thelightcosine ['thelightcosine '], 'Version' => '$Revision$', 'Platform' => 'php', 'Arch' => ARCH_PHP, diff --git a/modules/payloads/singles/generic/custom.rb b/modules/payloads/singles/generic/custom.rb index 1693e59c45..c91f585520 100644 --- a/modules/payloads/singles/generic/custom.rb +++ b/modules/payloads/singles/generic/custom.rb @@ -23,7 +23,7 @@ module Metasploit3 'Version' => '$Revision$', 'Description' => 'Use custom string or file as payload. Set either PAYLOADFILE or PAYLOADSTR.', - 'Author' => 'scriptjunkie ', + 'Author' => 'scriptjunkie ', 'License' => MSF_LICENSE, 'Payload' => { diff --git a/modules/post/aix/hashdump.rb b/modules/post/aix/hashdump.rb index dc7d508350..659d60d227 100644 --- a/modules/post/aix/hashdump.rb +++ b/modules/post/aix/hashdump.rb @@ -26,7 +26,7 @@ class Metasploit3 < Msf::Post 'Name' => 'AIX Gather Dump Password Hashes', 'Description' => %q{ Post Module to dump the password hashes for all users on an AIX System}, 'License' => MSF_LICENSE, - 'Author' => ['thelightcosine ['thelightcosine '], 'Version' => '$Revision$', 'Platform' => [ 'aix' ], 'SessionTypes' => [ 'shell' ] diff --git a/modules/post/windows/manage/vss_create.rb b/modules/post/windows/manage/vss_create.rb index e14785b50e..c7c42d798c 100644 --- a/modules/post/windows/manage/vss_create.rb +++ b/modules/post/windows/manage/vss_create.rb @@ -24,16 +24,16 @@ class Metasploit3 < Msf::Post super(update_info(info, 'Name' => "Windows Manage Create Shadow Copy", 'Description' => %q{ - This module will attempt to create a new volume shadow copy. - This is based on the VSSOwn Script originally posted by + This module will attempt to create a new volume shadow copy. + This is based on the VSSOwn Script originally posted by Tim Tomes and Mark Baggett. - + Works on win2k3 and later. }, 'License' => MSF_LICENSE, 'Platform' => ['windows'], 'SessionTypes' => ['meterpreter'], - 'Author' => ['thelightcosine ['thelightcosine '], 'References' => [ [ 'URL', 'http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html' ] ] @@ -42,7 +42,7 @@ class Metasploit3 < Msf::Post [ OptString.new('VOLUME', [ true, 'Volume to make a copy of.', 'C:\\']) ], self.class) - + end diff --git a/modules/post/windows/manage/vss_list.rb b/modules/post/windows/manage/vss_list.rb index 1f07bdad32..51914008ce 100644 --- a/modules/post/windows/manage/vss_list.rb +++ b/modules/post/windows/manage/vss_list.rb @@ -25,15 +25,15 @@ class Metasploit3 < Msf::Post 'Name' => "Windows Manage List Shadow Copies", 'Description' => %q{ This module will attempt to list any Volume Shadow Copies - on the system. This is based on the VSSOwn Script + on the system. This is based on the VSSOwn Script originally posted by Tim Tomes and Mark Baggett. - + Works on win2k3 and later. }, 'License' => MSF_LICENSE, 'Platform' => ['windows'], 'SessionTypes' => ['meterpreter'], - 'Author' => ['thelightcosine ['thelightcosine '], 'References' => [ [ 'URL', 'http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html' ] ] diff --git a/modules/post/windows/manage/vss_mount.rb b/modules/post/windows/manage/vss_mount.rb index 12e2dc48ba..b8e0b23f58 100644 --- a/modules/post/windows/manage/vss_mount.rb +++ b/modules/post/windows/manage/vss_mount.rb @@ -25,15 +25,15 @@ class Metasploit3 < Msf::Post 'Name' => "Windows Manage Mount Shadow Copy", 'Description' => %q{ This module will attempt to mount a Volume Shadow Copy - on the system. This is based on the VSSOwn Script + on the system. This is based on the VSSOwn Script originally posted by Tim Tomes and Mark Baggett. - + Works on win2k3 and later. }, 'License' => MSF_LICENSE, 'Platform' => ['windows'], 'SessionTypes' => ['meterpreter'], - 'Author' => ['thelightcosine ['thelightcosine '], 'References' => [ [ 'URL', 'http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html' ] ] @@ -43,8 +43,7 @@ class Metasploit3 < Msf::Post OptString.new('DEVICE', [ true, 'DeviceObject of Shadowcopy to mount.' ]), OptString.new('PATH', [ true, 'Path to mount it to.' ]) ], self.class) - - + end diff --git a/modules/post/windows/manage/vss_set_storage.rb b/modules/post/windows/manage/vss_set_storage.rb index 77dfa00e76..8699d8c9f8 100644 --- a/modules/post/windows/manage/vss_set_storage.rb +++ b/modules/post/windows/manage/vss_set_storage.rb @@ -25,16 +25,16 @@ class Metasploit3 < Msf::Post 'Name' => "Windows Manage Set Shadow Copy Storage Space", 'Description' => %q{ This module will attempt to change the ammount of space - for volume shadow copy storage. This is based on the - VSSOwn Script originally posted by Tim Tomes and + for volume shadow copy storage. This is based on the + VSSOwn Script originally posted by Tim Tomes and Mark Baggett. - + Works on win2k3 and later. }, 'License' => MSF_LICENSE, 'Platform' => ['windows'], 'SessionTypes' => ['meterpreter'], - 'Author' => ['thelightcosine ['thelightcosine '], 'References' => [ [ 'URL', 'http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html' ] ]