Fixes for #2350, random bind shellcode
* Moved shortlink to a reference. * Reformat e-mail address. * Fixed whitespace * Use multiline quote per most other module descriptions Still need to resplat the modules, but it's no big thang to do that after landing. Also, References do not seem to appear for post modules in the normal msfconsole. This is a bug in the UI, not for these modules -- many payloads would benefit from being explicit on their references, so may as well start with these.bug/bundler_fix
parent
31f265b411
commit
81a7b1a9bf
|
@ -15,11 +15,13 @@ module Metasploit3
|
|||
def initialize(info = {})
|
||||
super(merge_info(info,
|
||||
'Name' => 'Linux Command Shell, Bind TCP Random Port Inline',
|
||||
'Description' => 'Listen for a connection in a random port and spawn a command shell. ' \
|
||||
'Use nmap to discover the open port: \'nmap -sS target -p-\'. ' \
|
||||
'Assembly source: http://goo.gl/TAveVc',
|
||||
'Author' => 'Geyslan G. Bem <geyslan@gmail.com>',
|
||||
'Description' => %q{
|
||||
Listen for a connection in a random port and spawn a command shell.
|
||||
Use nmap to discover the open port: 'nmap -sS target -p-'.
|
||||
},
|
||||
'Author' => 'Geyslan G. Bem <geyslan[at]gmail.com>',
|
||||
'License' => BSD_LICENSE,
|
||||
'References' => ['URL', 'https://github.com/geyslan/SLAE/blob/master/improvements/tiny_shell_bind_tcp_random_port.asm'],
|
||||
'Platform' => 'linux',
|
||||
'Arch' => ARCH_X86_64,
|
||||
'Payload' =>
|
||||
|
|
|
@ -15,11 +15,13 @@ module Metasploit3
|
|||
def initialize(info = {})
|
||||
super(merge_info(info,
|
||||
'Name' => 'Linux Command Shell, Bind TCP Random Port Inline',
|
||||
'Description' => 'Listen for a connection in a random port and spawn a command shell. ' \
|
||||
'Use nmap to discover the open port: \'nmap -sS target -p-\'. ' \
|
||||
'Assembly source: http://goo.gl/V5OObo',
|
||||
'Author' => 'Geyslan G. Bem <geyslan@gmail.com>',
|
||||
'Description' => %q{
|
||||
Listen for a connection in a random port and spawn a command shell.
|
||||
Use nmap to discover the open port: 'nmap -sS target -p-'.
|
||||
},
|
||||
'Author' => 'Geyslan G. Bem <geyslan[at]gmail.com>',
|
||||
'License' => BSD_LICENSE,
|
||||
'References' => ['URL', 'https://github.com/geyslan/SLAE/blob/master/improvements/shell_bind_tcp_random_port_x86_64.asm'],
|
||||
'Platform' => 'linux',
|
||||
'Arch' => ARCH_X86,
|
||||
'Payload' =>
|
||||
|
|
Loading…
Reference in New Issue