Move pipeaudit to exploit/smb/client

GSoC/Meterpreter_Web_Console
Auxilus 2018-03-09 14:05:53 +05:30
parent 478f01d0d9
commit 899e03ba9b
4 changed files with 6 additions and 9 deletions

View File

@ -32,7 +32,6 @@ require 'msf/core/auxiliary/pii'
require 'msf/core/auxiliary/redis'
require 'msf/core/auxiliary/sms'
require 'msf/core/auxiliary/mms'
require 'msf/core/auxiliary/pipeaudit'
#
# Custom HTTP modules
#

View File

@ -124,3 +124,4 @@ require 'msf/core/exploit/fortinet'
# Other
require 'msf/core/exploit/windows_constants'
require 'msf/core/exploit/smb/client/pipeaudit'

View File

@ -1,15 +1,11 @@
module Msf
module Auxiliary::PipeAudit
include Msf::Exploit::Remote::SMB::Client
include Msf::Exploit::Remote::SMB::Client::Authenticated
include Msf::Auxiliary::Scanner
module Exploit::Remote::SMB::PipeAudit
include Msf::Exploit::Remote::SMB::Client::Psexec
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super
#register_options([
# OptString.new('RPORT', [true, 'The Target port', 445])
# ], Msf::Auxiliary::PIPEAudit
end
def connect_to_pipe()

View File

@ -1,9 +1,10 @@
require 'msf/core/exploit/smb/pipeaudit'
module Msf
module Exploit::Remote::SMB::Client::Psexec_MS17_010
include Msf::Exploit::Remote::SMB::Client::Psexec
include Msf::Auxiliary::PipeAudit
include Msf::Exploit::SMB::PipeAudit
include Msf::Exploit::Remote::Tcp
def initialize(info = {})