Add e-mail addr for corelanc0d3r (found it in auxiliary/fuzzers/ftp/client_ftp.rb)

unstable
sinn3r 2012-01-09 14:23:37 -06:00
parent eeb3a442de
commit 8eee54d1d0
27 changed files with 30 additions and 30 deletions

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
This module will serve an FTP server and perform FTP client interaction fuzzing
},
'Author' => [ 'corelanc0d3r' ],
'Author' => [ 'corelanc0d3r <peter.ve[at]corelan.be>' ],
'License' => MSF_LICENSE,
'Version' => "$Revision$",
'References' =>

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %q{
This module will connect to a FTP server and perform pre- and post-authentication fuzzing
},
'Author' => [ 'corelanc0d3r', 'jduck' ],
'Author' => [ 'corelanc0d3r <peter.ve[at]corelan.be>', 'jduck' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$'
)

View File

@ -28,7 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'MC', # Original Metasploit Module
'corelanc0d3r', # Added DEP Bypass support
'corelanc0d3r <peter.ve[at]corelan.be>', # Added DEP Bypass support
],
'Version' => '$Revision$',
'References' =>

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'dookie', # Discovered the bug
'Sud0', # Original exploit (from Offsec Exploit Weekend)
'corelanc0d3r', # Metasploit exploit
'corelanc0d3r <peter.ve[at]corelan.be>', # Metasploit exploit
'jduck' # Metasploit-fu
],
'References' =>

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'acidgen', #found the vulnerability
'corelanc0d3r' #rop exploit + msf module
'corelanc0d3r <peter.ve[at]corelan.be>' #rop exploit + msf module
],
'Version' => '$Revision$',
'References' =>

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'rick2600', #found the vulnerabilities
'corelanc0d3r', #rop exploit + msf module
'corelanc0d3r <peter.ve[at]corelan.be>', #rop exploit + msf module
],
'Version' => '$Revision$',
'References' =>

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'rick2600', #found the vulnerabilities
'corelanc0d3r', #rop exploit + msf module
'corelanc0d3r <peter.ve[at]corelan.be>', #rop exploit + msf module
],
'Version' => '$Revision$',
'References' =>

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => "$Revision$",
'Author' =>
[
'corelanc0d3r',
'corelanc0d3r <peter.ve[at]corelan.be>',
'rick2600',
],
'References' =>

View File

@ -29,7 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'Acidgen', #found the vulnerability
'corelanc0d3r', #rop exploit + msf module
'corelanc0d3r <peter.ve[at]corelan.be>', #rop exploit + msf module
],
'Version' => '$Revision$',
'References' =>

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Paul Makowski', #Initial discovery
'sickness', #proof of concept
'corelanc0d3r', #rop exploit + msf module
'corelanc0d3r <peter.ve[at]corelan.be>', #rop exploit + msf module
],
'Version' => '$Revision$',
'References' =>

View File

@ -31,8 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => "$Revision$",
'Author' =>
[
'hadji samir <s-dz [at] hotmail.fr>', # Discovered the bug
'corelanc0d3r', # First working exploit
'hadji samir <s-dz [at] hotmail.fr>', # Discovered the bug
'corelanc0d3r <peter.ve[at]corelan.be>', # First working exploit
'digital1', # First working exploit
'jduck', # Alpha+Unicode encoding :-/
'm_101' # Original and msf exploit

View File

@ -23,8 +23,8 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'fancy', # found the bug
'corelanc0d3r' # helped writing this module
'fancy', # found the bug
'corelanc0d3r <peter.ve[at]corelan.be>' # helped writing this module
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'corelanc0d3r', #found bug and wrote the exploit
'corelanc0d3r <peter.ve[at]corelan.be>', #found bug and wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -25,8 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'nullthreat', # found bug
'corelanc0d3r' # wrote the exploit
'nullthreat', # found bug
'corelanc0d3r <peter.ve[at]corelan.be>' # wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'ekse', # found the bug
'corelanc0d3r', # wrote the exploit
'corelanc0d3r <peter.ve[at]corelan.be>', # wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'corelanc0d3r' #found bug, wrote the exploit
'corelanc0d3r <peter.ve[at]corelan.be>' #found bug, wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -28,7 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'myne-us', #found the bug
'corelanc0d3r' #wrote the exploit
'corelanc0d3r <peter.ve[at]corelan.be>' #wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'nullthreat', # found the bug
'corelanc0d3r', # wrote the exploit
'corelanc0d3r <peter.ve[at]corelan.be>', # wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'corelanc0d3r', # Original bug, completed MSF module
'corelanc0d3r <peter.ve[at]corelan.be>', # Original bug, completed MSF module
'nullthreat' # Ported PoC to MSF
],
'License' => MSF_LICENSE,

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' =>
[
'rick2600', #found the bug
'corelanc0d3r', #wrote the exploit
'corelanc0d3r <peter.ve[at]corelan.be>', #wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'corelanc0d3r' # found bug, wrote the exploit
'corelanc0d3r <peter.ve[at]corelan.be>' # found bug, wrote the exploit
],
'License' => MSF_LICENSE,
'Version' => "$Revision$",

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Lincoln', # original discovery
'Nullthreat',
'rick2600',
'corelanc0d3r',
'corelanc0d3r <peter.ve[at]corelan.be>',
'jduck' # fleshed out module from advisory
],
'License' => MSF_LICENSE,

View File

@ -36,7 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'muts', #Initial poc of the ROP exploit w/ dookie (WPM())
'dookie', #Initial poc of the ROP exploit w/ muts (WPM())
'sinn3r', #MSF module with corelanc0d3r (Also Thx to MC and HD)
'corelanc0d3r', #MSF module with sinn3r, VP() ROP Chain
'corelanc0d3r <peter.ve[at]corelan.be>', #MSF module with sinn3r, VP() ROP Chain
],
'References' =>
[

View File

@ -28,7 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Paul Makowski', #Initial discovery
'sickness', #proof of concept
'corelanc0d3r', #rop exploit + msf module
'corelanc0d3r <peter.ve[at]corelan.be>', #rop exploit + msf module
],
'Version' => '$Revision$',
'References' =>

View File

@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Luigi Auriemma', #Initial discovery, poc
'Lincoln', #Metasploit
'corelanc0d3r', #Metasploit + custom migrate fu
'corelanc0d3r <peter.ve[at]corelan.be>', #Metasploit + custom migrate fu
],
'References' =>
[

View File

@ -34,7 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
'Luigi Auriemma', #Initial discovery, poc
'Lincoln', #Metasploit
'corelanc0d3r', #Rop exploit, combined XP SP3 & 2003 Server
'corelanc0d3r <peter.ve[at]corelan.be>', #Rop exploit, combined XP SP3 & 2003 Server
'sinn3r', #Serious Msf style policing
],
'References' =>

View File

@ -24,7 +24,7 @@ module Metasploit3
'Description' => 'Spawns a dialog via MessageBox using a customizable title, text & icon',
'Author' =>
[
'corelanc0d3r', # original payload module
'corelanc0d3r <peter.ve[at]corelan.be>', # original payload module
'jduck' # some ruby factoring
],
'License' => MSF_LICENSE,