Add reference and disclosure date
parent
9f9f28cc31
commit
7a76efa7f7
|
@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner',
|
'Name' => 'NTP Mode 7 PEER_LIST DoS Scanner',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module identifies NTP servers which permit "PEER_LIST" queries and
|
This module identifies NTP servers which permit "PEER_LIST" queries and
|
||||||
return responses that are larger in size or greater in quantity than
|
return responses that are larger in size or greater in quantity than
|
||||||
the request, allowing remote attackers to cause a denial of service
|
the request, allowing remote attackers to cause a denial of service
|
||||||
(traffic amplification) via spoofed requests.
|
(traffic amplification) via spoofed requests.
|
||||||
},
|
},
|
||||||
'References' =>
|
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||||
|
'References' =>
|
||||||
[
|
[
|
||||||
|
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||||
],
|
],
|
||||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
'DisclosureDate' => 'Aug 25 2014',
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
|
@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner',
|
'Name' => 'NTP Mode 7 PEER_LIST_SUM DoS Scanner',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
|
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
|
||||||
return responses that are larger in size or greater in quantity than
|
return responses that are larger in size or greater in quantity than
|
||||||
the request, allowing remote attackers to cause a denial of service
|
the request, allowing remote attackers to cause a denial of service
|
||||||
(traffic amplification) via spoofed requests.
|
(traffic amplification) via spoofed requests.
|
||||||
},
|
},
|
||||||
'References' =>
|
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||||
|
'References' =>
|
||||||
[
|
[
|
||||||
|
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||||
],
|
],
|
||||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
'DisclosureDate' => 'Aug 25 2014',
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
|
@ -15,19 +15,21 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
|
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
|
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
|
||||||
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
|
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
|
||||||
respond to REQ_NONCE requests with a response larger than the request,
|
respond to REQ_NONCE requests with a response larger than the request,
|
||||||
allowing remote attackers to cause a denial of services (traffic
|
allowing remote attackers to cause a denial of services (traffic
|
||||||
amplification) via spoofed requests.
|
amplification) via spoofed requests.
|
||||||
},
|
},
|
||||||
'References' =>
|
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||||
|
'References' =>
|
||||||
[
|
[
|
||||||
|
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||||
],
|
],
|
||||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
'DisclosureDate' => 'Aug 25 2014',
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
|
@ -15,8 +15,8 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner',
|
'Name' => 'NTP Mode 7 GET_RESTRICT DRDoS Scanner',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module identifies NTP servers which permit "reslist" queries and
|
This module identifies NTP servers which permit "reslist" queries and
|
||||||
obtains the list of restrictions placed on various network interfaces,
|
obtains the list of restrictions placed on various network interfaces,
|
||||||
networks or hosts. The reslist feature allows remote
|
networks or hosts. The reslist feature allows remote
|
||||||
|
@ -24,11 +24,13 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
spoofed requests. The more interfaces, networks or host with specific
|
spoofed requests. The more interfaces, networks or host with specific
|
||||||
restrictions, the greater the amplification.
|
restrictions, the greater the amplification.
|
||||||
},
|
},
|
||||||
'References' =>
|
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||||
|
'References' =>
|
||||||
[
|
[
|
||||||
|
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||||
],
|
],
|
||||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
'DisclosureDate' => 'Aug 25 2014',
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
|
@ -15,18 +15,20 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner',
|
'Name' => 'NTP Mode 6 UNSETTRAP DRDoS Scanner',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
|
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
|
||||||
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
|
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
|
||||||
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
|
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
|
||||||
cause a denial of services (traffic amplification) via spoofed requests.
|
cause a denial of services (traffic amplification) via spoofed requests.
|
||||||
},
|
},
|
||||||
'References' =>
|
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
||||||
|
'References' =>
|
||||||
[
|
[
|
||||||
|
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
|
||||||
],
|
],
|
||||||
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
|
'DisclosureDate' => 'Aug 25 2014',
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue