Move pipeaudit to exploit/smb/client
parent
478f01d0d9
commit
899e03ba9b
|
@ -32,7 +32,6 @@ require 'msf/core/auxiliary/pii'
|
|||
require 'msf/core/auxiliary/redis'
|
||||
require 'msf/core/auxiliary/sms'
|
||||
require 'msf/core/auxiliary/mms'
|
||||
require 'msf/core/auxiliary/pipeaudit'
|
||||
#
|
||||
# Custom HTTP modules
|
||||
#
|
||||
|
|
|
@ -124,3 +124,4 @@ require 'msf/core/exploit/fortinet'
|
|||
|
||||
# Other
|
||||
require 'msf/core/exploit/windows_constants'
|
||||
require 'msf/core/exploit/smb/client/pipeaudit'
|
||||
|
|
|
@ -1,15 +1,11 @@
|
|||
module Msf
|
||||
|
||||
module Auxiliary::PipeAudit
|
||||
include Msf::Exploit::Remote::SMB::Client
|
||||
include Msf::Exploit::Remote::SMB::Client::Authenticated
|
||||
include Msf::Auxiliary::Scanner
|
||||
module Exploit::Remote::SMB::PipeAudit
|
||||
include Msf::Exploit::Remote::SMB::Client::Psexec
|
||||
include Msf::Exploit::Remote::Tcp
|
||||
|
||||
def initialize(info = {})
|
||||
super
|
||||
#register_options([
|
||||
# OptString.new('RPORT', [true, 'The Target port', 445])
|
||||
# ], Msf::Auxiliary::PIPEAudit
|
||||
end
|
||||
|
||||
def connect_to_pipe()
|
|
@ -1,9 +1,10 @@
|
|||
require 'msf/core/exploit/smb/pipeaudit'
|
||||
module Msf
|
||||
|
||||
module Exploit::Remote::SMB::Client::Psexec_MS17_010
|
||||
|
||||
include Msf::Exploit::Remote::SMB::Client::Psexec
|
||||
include Msf::Auxiliary::PipeAudit
|
||||
include Msf::Exploit::SMB::PipeAudit
|
||||
include Msf::Exploit::Remote::Tcp
|
||||
|
||||
def initialize(info = {})
|
||||
|
|
Loading…
Reference in New Issue