Fixes for #2350, random bind shellcode

* Moved shortlink to a reference.
  * Reformat e-mail address.
  * Fixed whitespace
  * Use multiline quote per most other module descriptions

Still need to resplat the modules, but it's no big thang to do that
after landing. Also, References do not seem to appear for post modules
in the normal msfconsole. This is a bug in the UI, not for these modules
-- many payloads would benefit from being explicit on their references,
so may as well start with these.
bug/bundler_fix
Tod Beardsley 2013-11-11 10:33:15 -06:00
parent 31f265b411
commit 81a7b1a9bf
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
3 changed files with 26 additions and 22 deletions

View File

@ -15,11 +15,13 @@ module Metasploit3
def initialize(info = {}) def initialize(info = {})
super(merge_info(info, super(merge_info(info,
'Name' => 'Linux Command Shell, Bind TCP Random Port Inline', 'Name' => 'Linux Command Shell, Bind TCP Random Port Inline',
'Description' => 'Listen for a connection in a random port and spawn a command shell. ' \ 'Description' => %q{
'Use nmap to discover the open port: \'nmap -sS target -p-\'. ' \ Listen for a connection in a random port and spawn a command shell.
'Assembly source: http://goo.gl/TAveVc', Use nmap to discover the open port: 'nmap -sS target -p-'.
'Author' => 'Geyslan G. Bem <geyslan@gmail.com>', },
'Author' => 'Geyslan G. Bem <geyslan[at]gmail.com>',
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'References' => ['URL', 'https://github.com/geyslan/SLAE/blob/master/improvements/tiny_shell_bind_tcp_random_port.asm'],
'Platform' => 'linux', 'Platform' => 'linux',
'Arch' => ARCH_X86_64, 'Arch' => ARCH_X86_64,
'Payload' => 'Payload' =>

View File

@ -15,11 +15,13 @@ module Metasploit3
def initialize(info = {}) def initialize(info = {})
super(merge_info(info, super(merge_info(info,
'Name' => 'Linux Command Shell, Bind TCP Random Port Inline', 'Name' => 'Linux Command Shell, Bind TCP Random Port Inline',
'Description' => 'Listen for a connection in a random port and spawn a command shell. ' \ 'Description' => %q{
'Use nmap to discover the open port: \'nmap -sS target -p-\'. ' \ Listen for a connection in a random port and spawn a command shell.
'Assembly source: http://goo.gl/V5OObo', Use nmap to discover the open port: 'nmap -sS target -p-'.
'Author' => 'Geyslan G. Bem <geyslan@gmail.com>', },
'Author' => 'Geyslan G. Bem <geyslan[at]gmail.com>',
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'References' => ['URL', 'https://github.com/geyslan/SLAE/blob/master/improvements/shell_bind_tcp_random_port_x86_64.asm'],
'Platform' => 'linux', 'Platform' => 'linux',
'Arch' => ARCH_X86, 'Arch' => ARCH_X86,
'Payload' => 'Payload' =>