add scanner functionality to oracle_version.rb and removed some comments from options.rb

git-svn-id: file:///home/svn/framework3/trunk@6088 4d416f70-5f16-0410-b530-b9f4589650da
unstable
cg 2009-01-08 01:57:28 +00:00
parent 4ac15b3a83
commit 9b210702a3
2 changed files with 9 additions and 9 deletions

View File

@ -22,13 +22,12 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'HTTP Options Detection', 'Name' => 'HTTP Options Detection',
'Version' => '$Revision: $', 'Version' => '$Revision: $',
'Description' => 'Display available HTTP options for each system', 'Description' => 'Display available HTTP options for each system',
'Author' => 'CG |at| carnal0wnage |dot| com', 'Author' => ['CG'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
end end
# Fingerprint a single host
def run_host(ip) def run_host(ip)
self.target_port = datastore['RPORT'] self.target_port = datastore['RPORT']
@ -48,7 +47,7 @@ class Metasploit3 < Msf::Auxiliary
wmap_target_port, wmap_target_port,
wmap_target_ssl wmap_target_ssl
) )
#not sure about this one, can you add columns in the db on the fly?
wmap_report(rep_id,'WEB_SERVER','OPTIONS',"#{res.headers['Allow']}",nil) wmap_report(rep_id,'WEB_SERVER','OPTIONS',"#{res.headers['Allow']}",nil)
else else
print_status("No options.") print_status("No options.")

View File

@ -10,14 +10,15 @@ require 'msf/core'
class Metasploit3 < Msf::Auxiliary class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::TNS include Msf::Exploit::Remote::TNS
include Msf::Auxiliary::Scanner
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Oracle Version Enumeration.', 'Name' => 'Oracle Version Enumeration.',
'Description' => %q{ 'Description' => %q{
This module simply queries the TNS listner for the Oracle build.. This module simply queries the TNS listner for the Oracle build.
}, },
'Author' => [ 'CG'], 'Author' => ['CG'],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'DisclosureDate' => 'Jan 7 2009')) 'DisclosureDate' => 'Jan 7 2009'))
@ -29,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
end end
def run def run_host(ip)
connect_data = "(CONNECT_DATA=(COMMAND=VERSION))" connect_data = "(CONNECT_DATA=(COMMAND=VERSION))"
@ -49,12 +50,12 @@ class Metasploit3 < Msf::Auxiliary
data = sock.get_once data = sock.get_once
if ( data and data =~ /\\*.TNSLSNR for (.*)/ ) if ( data and data =~ /\\*.TNSLSNR for (.*)/ )
return print_status("Host #{rhost} is running: " + $1) return print_status("Host #{ip} is running: " + $1)
else else
return print_error("Unable to determine version info for #{rhost}...") return print_error("Unable to determine version info for #{ip}...")
disconnect disconnect
end end
end end
end end