diff --git a/modules/auxiliary/scanner/ntp/ntp_peer_list_dos.rb b/modules/auxiliary/scanner/ntp/ntp_peer_list_dos.rb index 95dbcb0393..8ba49a109a 100644 --- a/modules/auxiliary/scanner/ntp/ntp_peer_list_dos.rb +++ b/modules/auxiliary/scanner/ntp/ntp_peer_list_dos.rb @@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner', - 'Description' => %q{ + 'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner', + 'Description' => %q{ This module identifies NTP servers which permit "PEER_LIST" queries and return responses that are larger in size or greater in quantity than the request, allowing remote attackers to cause a denial of service (traffic amplification) via spoofed requests. }, - 'References' => + 'Author' => 'Jon Hart ', + 'References' => [ + ['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'] ], - 'Author' => 'Jon Hart ', - 'License' => MSF_LICENSE + 'DisclosureDate' => 'Aug 25 2014', + 'License' => MSF_LICENSE ) end diff --git a/modules/auxiliary/scanner/ntp/ntp_peer_list_sum_dos.rb b/modules/auxiliary/scanner/ntp/ntp_peer_list_sum_dos.rb index bdbd638472..bbaba301e3 100644 --- a/modules/auxiliary/scanner/ntp/ntp_peer_list_sum_dos.rb +++ b/modules/auxiliary/scanner/ntp/ntp_peer_list_sum_dos.rb @@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner', - 'Description' => %q{ + 'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner', + 'Description' => %q{ This module identifies NTP servers which permit "PEER_LIST_SUM" queries and return responses that are larger in size or greater in quantity than the request, allowing remote attackers to cause a denial of service (traffic amplification) via spoofed requests. }, - 'References' => + 'Author' => 'Jon Hart ', + 'References' => [ + ['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'] ], - 'Author' => 'Jon Hart ', - 'License' => MSF_LICENSE + 'DisclosureDate' => 'Aug 25 2014', + 'License' => MSF_LICENSE ) end diff --git a/modules/auxiliary/scanner/ntp/ntp_req_nonce_dos.rb b/modules/auxiliary/scanner/ntp/ntp_req_nonce_dos.rb index 1bb6a3629b..cbb8f6a598 100644 --- a/modules/auxiliary/scanner/ntp/ntp_req_nonce_dos.rb +++ b/modules/auxiliary/scanner/ntp/ntp_req_nonce_dos.rb @@ -15,19 +15,21 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner', - 'Description' => %q{ + 'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner', + 'Description' => %q{ This module identifies NTP servers which permit mode 6 REQ_NONCE requests that can be used to conduct DRDoS attacks. In some configurations, NTP servers will respond to REQ_NONCE requests with a response larger than the request, allowing remote attackers to cause a denial of services (traffic amplification) via spoofed requests. }, - 'References' => + 'Author' => 'Jon Hart ', + 'References' => [ + ['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'] ], - 'Author' => 'Jon Hart ', - 'License' => MSF_LICENSE + 'DisclosureDate' => 'Aug 25 2014', + 'License' => MSF_LICENSE ) end diff --git a/modules/auxiliary/scanner/ntp/ntp_reslist_dos.rb b/modules/auxiliary/scanner/ntp/ntp_reslist_dos.rb index 420eae455a..b0728492e5 100644 --- a/modules/auxiliary/scanner/ntp/ntp_reslist_dos.rb +++ b/modules/auxiliary/scanner/ntp/ntp_reslist_dos.rb @@ -15,8 +15,8 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner', - 'Description' => %q{ + 'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner', + 'Description' => %q{ This module identifies NTP servers which permit "reslist" queries and obtains the list of restrictions placed on various network interfaces, networks or hosts. The reslist feature allows remote @@ -24,11 +24,13 @@ class Metasploit3 < Msf::Auxiliary spoofed requests. The more interfaces, networks or host with specific restrictions, the greater the amplification. }, - 'References' => + 'Author' => 'Jon Hart ', + 'References' => [ + ['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'] ], - 'Author' => 'Jon Hart ', - 'License' => MSF_LICENSE + 'DisclosureDate' => 'Aug 25 2014', + 'License' => MSF_LICENSE ) end diff --git a/modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb b/modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb index c74e71f6ac..978a36279e 100644 --- a/modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb +++ b/modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb @@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner', - 'Description' => %q{ + 'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner', + 'Description' => %q{ This module identifies NTP servers which permit mode 6 UNSETTRAP requests that can be used to conduct DRDoS attacks. In some configurations, NTP servers will respond to UNSETTRAP requests with multiple packets, allowing remote attackers to cause a denial of services (traffic amplification) via spoofed requests. }, - 'References' => + 'Author' => 'Jon Hart ', + 'References' => [ + ['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'] ], - 'Author' => 'Jon Hart ', - 'License' => MSF_LICENSE + 'DisclosureDate' => 'Aug 25 2014', + 'License' => MSF_LICENSE ) end