Add reference and disclosure date
parent
9f9f28cc31
commit
7a76efa7f7
|
@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner',
|
||||
'Description' => %q{
|
||||
'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner',
|
||||
'Description' => %q{
|
||||
This module identifies NTP servers which permit "PEER_LIST" queries and
|
||||
return responses that are larger in size or greater in quantity than
|
||||
the request, allowing remote attackers to cause a denial of service
|
||||
(traffic amplification) via spoofed requests.
|
||||
},
|
||||
'References' =>
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||
],
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'License' => MSF_LICENSE
|
||||
'DisclosureDate' => 'Aug 25 2014',
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
end
|
||||
|
||||
|
|
|
@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner',
|
||||
'Description' => %q{
|
||||
'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner',
|
||||
'Description' => %q{
|
||||
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
|
||||
return responses that are larger in size or greater in quantity than
|
||||
the request, allowing remote attackers to cause a denial of service
|
||||
(traffic amplification) via spoofed requests.
|
||||
},
|
||||
'References' =>
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||
],
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'License' => MSF_LICENSE
|
||||
'DisclosureDate' => 'Aug 25 2014',
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
end
|
||||
|
||||
|
|
|
@ -15,19 +15,21 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
|
||||
'Description' => %q{
|
||||
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
|
||||
'Description' => %q{
|
||||
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
|
||||
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
|
||||
respond to REQ_NONCE requests with a response larger than the request,
|
||||
allowing remote attackers to cause a denial of services (traffic
|
||||
amplification) via spoofed requests.
|
||||
},
|
||||
'References' =>
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||
],
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'License' => MSF_LICENSE
|
||||
'DisclosureDate' => 'Aug 25 2014',
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
end
|
||||
|
||||
|
|
|
@ -15,8 +15,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner',
|
||||
'Description' => %q{
|
||||
'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner',
|
||||
'Description' => %q{
|
||||
This module identifies NTP servers which permit "reslist" queries and
|
||||
obtains the list of restrictions placed on various network interfaces,
|
||||
networks or hosts. The reslist feature allows remote
|
||||
|
@ -24,11 +24,13 @@ class Metasploit3 < Msf::Auxiliary
|
|||
spoofed requests. The more interfaces, networks or host with specific
|
||||
restrictions, the greater the amplification.
|
||||
},
|
||||
'References' =>
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||
],
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'License' => MSF_LICENSE
|
||||
'DisclosureDate' => 'Aug 25 2014',
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
end
|
||||
|
||||
|
|
|
@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner',
|
||||
'Description' => %q{
|
||||
'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner',
|
||||
'Description' => %q{
|
||||
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
|
||||
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
|
||||
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
|
||||
cause a denial of services (traffic amplification) via spoofed requests.
|
||||
},
|
||||
'References' =>
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||
],
|
||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||
'License' => MSF_LICENSE
|
||||
'DisclosureDate' => 'Aug 25 2014',
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue