Move pipeaudit to exploit/smb/client

GSoC/Meterpreter_Web_Console
Auxilus 2018-03-09 14:05:53 +05:30
parent 478f01d0d9
commit 899e03ba9b
4 changed files with 6 additions and 9 deletions

View File

@ -32,7 +32,6 @@ require 'msf/core/auxiliary/pii'
require 'msf/core/auxiliary/redis' require 'msf/core/auxiliary/redis'
require 'msf/core/auxiliary/sms' require 'msf/core/auxiliary/sms'
require 'msf/core/auxiliary/mms' require 'msf/core/auxiliary/mms'
require 'msf/core/auxiliary/pipeaudit'
# #
# Custom HTTP modules # Custom HTTP modules
# #

View File

@ -124,3 +124,4 @@ require 'msf/core/exploit/fortinet'
# Other # Other
require 'msf/core/exploit/windows_constants' require 'msf/core/exploit/windows_constants'
require 'msf/core/exploit/smb/client/pipeaudit'

View File

@ -1,15 +1,11 @@
module Msf module Msf
module Auxiliary::PipeAudit module Exploit::Remote::SMB::PipeAudit
include Msf::Exploit::Remote::SMB::Client include Msf::Exploit::Remote::SMB::Client::Psexec
include Msf::Exploit::Remote::SMB::Client::Authenticated include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Scanner
def initialize(info = {}) def initialize(info = {})
super super
#register_options([
# OptString.new('RPORT', [true, 'The Target port', 445])
# ], Msf::Auxiliary::PIPEAudit
end end
def connect_to_pipe() def connect_to_pipe()

View File

@ -1,9 +1,10 @@
require 'msf/core/exploit/smb/pipeaudit'
module Msf module Msf
module Exploit::Remote::SMB::Client::Psexec_MS17_010 module Exploit::Remote::SMB::Client::Psexec_MS17_010
include Msf::Exploit::Remote::SMB::Client::Psexec include Msf::Exploit::Remote::SMB::Client::Psexec
include Msf::Auxiliary::PipeAudit include Msf::Exploit::SMB::PipeAudit
include Msf::Exploit::Remote::Tcp include Msf::Exploit::Remote::Tcp
def initialize(info = {}) def initialize(info = {})