add scanner functionality to oracle_version.rb and removed some comments from options.rb
git-svn-id: file:///home/svn/framework3/trunk@6088 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
4ac15b3a83
commit
9b210702a3
|
@ -22,13 +22,12 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'Name' => 'HTTP Options Detection',
|
'Name' => 'HTTP Options Detection',
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision: $',
|
||||||
'Description' => 'Display available HTTP options for each system',
|
'Description' => 'Display available HTTP options for each system',
|
||||||
'Author' => 'CG |at| carnal0wnage |dot| com',
|
'Author' => ['CG'],
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
)
|
)
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
# Fingerprint a single host
|
|
||||||
def run_host(ip)
|
def run_host(ip)
|
||||||
|
|
||||||
self.target_port = datastore['RPORT']
|
self.target_port = datastore['RPORT']
|
||||||
|
@ -48,7 +47,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
wmap_target_port,
|
wmap_target_port,
|
||||||
wmap_target_ssl
|
wmap_target_ssl
|
||||||
)
|
)
|
||||||
#not sure about this one, can you add columns in the db on the fly?
|
|
||||||
wmap_report(rep_id,'WEB_SERVER','OPTIONS',"#{res.headers['Allow']}",nil)
|
wmap_report(rep_id,'WEB_SERVER','OPTIONS',"#{res.headers['Allow']}",nil)
|
||||||
else
|
else
|
||||||
print_status("No options.")
|
print_status("No options.")
|
||||||
|
|
|
@ -10,14 +10,15 @@ require 'msf/core'
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
include Msf::Exploit::Remote::TNS
|
include Msf::Exploit::Remote::TNS
|
||||||
|
include Msf::Auxiliary::Scanner
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Oracle Version Enumeration.',
|
'Name' => 'Oracle Version Enumeration.',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module simply queries the TNS listner for the Oracle build..
|
This module simply queries the TNS listner for the Oracle build.
|
||||||
},
|
},
|
||||||
'Author' => [ 'CG'],
|
'Author' => ['CG'],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'DisclosureDate' => 'Jan 7 2009'))
|
'DisclosureDate' => 'Jan 7 2009'))
|
||||||
|
@ -29,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
def run
|
def run_host(ip)
|
||||||
|
|
||||||
connect_data = "(CONNECT_DATA=(COMMAND=VERSION))"
|
connect_data = "(CONNECT_DATA=(COMMAND=VERSION))"
|
||||||
|
|
||||||
|
@ -49,12 +50,12 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
data = sock.get_once
|
data = sock.get_once
|
||||||
|
|
||||||
if ( data and data =~ /\\*.TNSLSNR for (.*)/ )
|
if ( data and data =~ /\\*.TNSLSNR for (.*)/ )
|
||||||
return print_status("Host #{rhost} is running: " + $1)
|
return print_status("Host #{ip} is running: " + $1)
|
||||||
else
|
else
|
||||||
return print_error("Unable to determine version info for #{rhost}...")
|
return print_error("Unable to determine version info for #{ip}...")
|
||||||
|
|
||||||
disconnect
|
disconnect
|
||||||
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue