Add reference and disclosure date

bug/bundler_fix
William Vu 2014-08-25 11:46:47 -05:00
parent 9f9f28cc31
commit 7a76efa7f7
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
5 changed files with 35 additions and 25 deletions

View File

@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner', 'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner',
'Description' => %q{ 'Description' => %q{
This module identifies NTP servers which permit "PEER_LIST" queries and This module identifies NTP servers which permit "PEER_LIST" queries and
return responses that are larger in size or greater in quantity than return responses that are larger in size or greater in quantity than
the request, allowing remote attackers to cause a denial of service the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests. (traffic amplification) via spoofed requests.
}, },
'References' => 'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[ [
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
], ],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>', 'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
end end

View File

@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner', 'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner',
'Description' => %q{ 'Description' => %q{
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
return responses that are larger in size or greater in quantity than return responses that are larger in size or greater in quantity than
the request, allowing remote attackers to cause a denial of service the request, allowing remote attackers to cause a denial of service
(traffic amplification) via spoofed requests. (traffic amplification) via spoofed requests.
}, },
'References' => 'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[ [
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
], ],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>', 'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
end end

View File

@ -15,19 +15,21 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner', 'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
'Description' => %q{ 'Description' => %q{
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
can be used to conduct DRDoS attacks. In some configurations, NTP servers will can be used to conduct DRDoS attacks. In some configurations, NTP servers will
respond to REQ_NONCE requests with a response larger than the request, respond to REQ_NONCE requests with a response larger than the request,
allowing remote attackers to cause a denial of services (traffic allowing remote attackers to cause a denial of services (traffic
amplification) via spoofed requests. amplification) via spoofed requests.
}, },
'References' => 'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[ [
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
], ],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>', 'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
end end

View File

@ -15,8 +15,8 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner', 'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner',
'Description' => %q{ 'Description' => %q{
This module identifies NTP servers which permit "reslist" queries and This module identifies NTP servers which permit "reslist" queries and
obtains the list of restrictions placed on various network interfaces, obtains the list of restrictions placed on various network interfaces,
networks or hosts. The reslist feature allows remote networks or hosts. The reslist feature allows remote
@ -24,11 +24,13 @@ class Metasploit3 < Msf::Auxiliary
spoofed requests. The more interfaces, networks or host with specific spoofed requests. The more interfaces, networks or host with specific
restrictions, the greater the amplification. restrictions, the greater the amplification.
}, },
'References' => 'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[ [
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
], ],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>', 'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
end end

View File

@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner', 'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner',
'Description' => %q{ 'Description' => %q{
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
can be used to conduct DRDoS attacks. In some configurations, NTP servers will can be used to conduct DRDoS attacks. In some configurations, NTP servers will
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
cause a denial of services (traffic amplification) via spoofed requests. cause a denial of services (traffic amplification) via spoofed requests.
}, },
'References' => 'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
'References' =>
[ [
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
], ],
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>', 'DisclosureDate' => 'Aug 25 2014',
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
end end