Add reference and disclosure date

bug/bundler_fix
William Vu 2014-08-25 11:46:47 -05:00
parent 9f9f28cc31
commit 7a76efa7f7
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
5 changed files with 35 additions and 25 deletions

View File

@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner',
'Description' => %q{
'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner',
'Description' => %q{
This module identifies NTP servers which permit "PEER_LIST" queries and
return responses that are larger in size or greater in quantity than
the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests.
},
'References' =>
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'License' => MSF_LICENSE
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner',
'Description' => %q{
'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner',
'Description' => %q{
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
return responses that are larger in size or greater in quantity than
the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests.
},
'References' =>
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'License' => MSF_LICENSE
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -15,19 +15,21 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
'Description' => %q{
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
'Description' => %q{
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
respond to REQ_NONCE requests with a response larger than the request,
allowing remote attackers to cause a denial of services (traffic
amplification) via spoofed requests.
},
'References' =>
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'License' => MSF_LICENSE
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -15,8 +15,8 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner',
'Description' => %q{
'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner',
'Description' => %q{
This module identifies NTP servers which permit "reslist" queries and
obtains the list of restrictions placed on various network interfaces,
networks or hosts. The reslist feature allows remote
@ -24,11 +24,13 @@ class Metasploit3 < Msf::Auxiliary
spoofed requests. The more interfaces, networks or host with specific
restrictions, the greater the amplification.
},
'References' =>
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'License' => MSF_LICENSE
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end

View File

@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner',
'Description' => %q{
'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner',
'Description' => %q{
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
cause a denial of services (traffic amplification) via spoofed requests.
},
'References' =>
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'License' => MSF_LICENSE
'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE
)
end