From abed3bf6c2b80581dda1fb3ae7b445cf20898866 Mon Sep 17 00:00:00 2001 From: Jon Hart Date: Fri, 30 Sep 2016 06:35:26 -0700 Subject: [PATCH] Rename --- .../gather/aws_ec2_instance_metadata.rb} | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename modules/post/{linux/gather/enum_aws_ec2_instance_metadata.rb => multi/gather/aws_ec2_instance_metadata.rb} (94%) diff --git a/modules/post/linux/gather/enum_aws_ec2_instance_metadata.rb b/modules/post/multi/gather/aws_ec2_instance_metadata.rb similarity index 94% rename from modules/post/linux/gather/enum_aws_ec2_instance_metadata.rb rename to modules/post/multi/gather/aws_ec2_instance_metadata.rb index 5315ea8ccc..fb69703c8d 100644 --- a/modules/post/linux/gather/enum_aws_ec2_instance_metadata.rb +++ b/modules/post/multi/gather/aws_ec2_instance_metadata.rb @@ -10,7 +10,7 @@ class MetasploitModule < Msf::Post super( update_info( info, - 'Name' => 'Enumerate AWS EC2 Instance Metadata', + 'Name' => 'Gather AWS EC2 Instance Metadata', 'Description' => %q( This module will attempt to connect to the AWS EC2 instance metadata service and crawl and collect all metadata known about the session'd host. @@ -20,7 +20,7 @@ class MetasploitModule < Msf::Post 'Jon Hart ' # original metasploit module ], # TODO: is there a way to do this on Windows? - 'Platform' => %w(linux osx unix), + 'Platform' => %w(unix), 'SessionTypes' => %w(shell meterpreter), 'References' => [ @@ -31,7 +31,7 @@ class MetasploitModule < Msf::Post register_advanced_options( [ - OptString.new('TARGETURI', [true, 'AWS EC2 Instance metadata URI', 'http://169.254.169.254/latest/meta-data/ ']) + OptString.new('TARGETURI', [true, 'AWS EC2 Instance metadata URI', 'http://169.254.169.254/latest/meta-data/']) ] ) end