remove peer methods since it is already defined in Msf::Exploit::Remote::HttpClient

bug/bundler_fix
FireFart 2013-09-25 23:42:44 +02:00
parent 3cc09bc3ab
commit 84ec2cbf11
31 changed files with 0 additions and 147 deletions

View File

@ -42,10 +42,6 @@ class Metasploit3 < Msf::Auxiliary
datastore['RPORT']
end
def peer
"#{rhost}:#{rport}"
end
def run
record = "<RECORD>"
record << "<NAME>SRS</NAME><OPERATION>4</OPERATION><CMD>7</CMD>" # Operation

View File

@ -50,10 +50,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{datastore['RHOST']}:#{datastore['RPORT']}"
end
def fingerprint(response)
if(response.headers.has_key?('Server') )

View File

@ -41,10 +41,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def execute_php_code(code, opts = {})
param_name = Rex::Text.rand_text_alpha(6)
padding = Rex::Text.rand_text_alpha(6)

View File

@ -47,10 +47,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def get_domain_info(session)
res = send_request_cgi({
'uri' => "/RegWeb/RegWeb/GetDomainControllerServlet",

View File

@ -39,10 +39,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def peer
"#{rhost}:#{rport}"
end
def run_host(rhost)
url = normalize_uri(datastore['URI'], '/index.php/members')

View File

@ -37,11 +37,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def anonymous_access?
res = send_request_raw({'uri' => '/'})
return true if res and res.body =~ /username = "hpsmh_anonymous"/

View File

@ -29,10 +29,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def run_host(ip)
tpath = normalize_uri(target_uri.path)
if tpath[-1,1] != '/'

View File

@ -31,10 +31,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def run_host(ip)
tpath = normalize_uri(target_uri.path)
if tpath[-1,1] != '/'

View File

@ -30,10 +30,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def os_fingerprint(response)
if not response.headers.has_key?('Server')
return "Unkown OS (No Server Header)"

View File

@ -56,14 +56,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def peer(rhost)
"#{rhost}:#{rport}"
end
def get_first_session
res = send_request_cgi({
'uri' => normalize_uri(target_uri.to_s, "index.php"),

View File

@ -46,14 +46,6 @@ class Metasploit4 < Msf::Auxiliary
end
def rport
datastore['RPORT']
end
def peer
"#{rhost}:#{rport}"
end
def run_host(ip)
traversal = "..\\" * datastore['DEPTH']

View File

@ -47,14 +47,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def peer
"#{rhost}:#{rport}"
end
def run_host(ip)
record = "<RECORD><NAME>SRS</NAME><OPERATION>4</OPERATION><CMD>103</CMD><PATH>#{datastore['RFILE']}</PATH></RECORD>"

View File

@ -32,10 +32,6 @@ class Metasploit3 < Msf::Auxiliary
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def run_host(ip)
File.open(datastore['TARGETURIS'], 'rb').each_line do |line|
test_uri = line.chomp

View File

@ -51,12 +51,6 @@ class Metasploit3 < Msf::Auxiliary
deregister_options('RHOST')
end
def peer
"#{rhost}:#{rport}"
end
def auth(username, password, sid, last_login)
res = send_request_cgi({
'method' => 'POST',

View File

@ -70,12 +70,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def check
@cookie = ''

View File

@ -79,10 +79,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def lookup_lhost()
# Get the source address
if datastore['SRVHOST'] == '0.0.0.0'

View File

@ -56,10 +56,6 @@ class Metasploit3 < Msf::Exploit::Remote
return target_uri.path
end
def peer
return "#{rhost}:#{rport}"
end
def check
# Check version
print_status("#{peer} - Trying to detect installed version")

View File

@ -53,12 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
#
# Checks if target is running HavaLite CMS 1.1.7
# We only flag 1.1.7 as vulnerable, because we don't have enough information from

View File

@ -65,10 +65,6 @@ class Metasploit3 < Msf::Exploit::Remote
end
def peer
return "#{rhost}:#{rport}"
end
def check
res = get_upload_form

View File

@ -53,12 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def check
res = send_request_raw({'uri' => normalize_uri(target_uri.path)})
if not res

View File

@ -66,10 +66,6 @@ class Metasploit3 < Msf::Exploit::Remote
return uri
end
def peer
"#{rhost}:#{rport}"
end
def remote_exe(command)
res = send_request_cgi({
'uri' => "#{base}backend.php",

View File

@ -52,10 +52,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def uri
return target_uri.path
end

View File

@ -55,10 +55,6 @@ class Metasploit3 < Msf::Exploit::Remote
return target_uri.path
end
def peer
return "#{rhost}:#{rport}"
end
def check
# Check version
print_status("#{peer} - Trying to detect ZeroShell")

View File

@ -56,12 +56,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def check
res = send_request_raw({'uri' => normalize_uri(target_uri.path)})
if not res

View File

@ -57,10 +57,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def webfolder_uri
begin
u = datastore['WRITEWEBFOLDER']

View File

@ -116,10 +116,6 @@ class Metasploit3 < Msf::Exploit::Remote
return nil
end
def peer
return "#{rhost}:#{rport}"
end
def exploit
print_status("#{peer} - Getting a valid session...")
session = get_session

View File

@ -114,10 +114,6 @@ class Metasploit3 < Msf::Exploit::Remote
return nil
end
def peer
return "#{rhost}:#{rport}"
end
def exploit
print_status("#{peer} - Getting a valid session...")
session = get_session

View File

@ -64,10 +64,6 @@ class Metasploit3 < Msf::Exploit::Remote
end
def peer
"#{rhost}:#{rport}"
end
def check
begin

View File

@ -53,10 +53,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
"#{rhost}:#{rport}"
end
def get_version
version = nil

View File

@ -55,10 +55,6 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
def peer
return "#{rhost}:#{rport}"
end
def version_soap
soap = <<-eos
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns="http://www.endeca.com/endeca-server/control/1/0">

View File

@ -92,10 +92,6 @@ class Metasploit3 < Msf::Exploit::Remote
end
def peer
"#{rhost}:#{rport}"
end
def exploit
# In order to save binary data to the file system the payload is written to a .vbs