automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-06-14 14:42:21 -07:00
parent b733b79533
commit ad978097f9
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 27 additions and 1 deletions

View File

@ -89412,7 +89412,9 @@
"platform": "Linux",
"arch": "x86",
"rport": "",
"targets": null,
"targets": [
],
"mod_time": "2018-06-13 15:31:49 +0000",
"path": "/modules/payloads/singles/linux/x86/shell_reverse_tcp_ipv6.rb",
"is_install_path": true,
@ -101019,6 +101021,30 @@
"is_install_path": true,
"ref_name": "multi/recon/multiport_egress_traffic"
},
"post_multi/recon/sudo_commands": {
"name": "Sudo Commands",
"full_name": "post/multi/recon/sudo_commands",
"rank": 300,
"disclosure_date": null,
"type": "post",
"author": [
"bcoles"
],
"description": "This module examines the sudoers configuration for the session user\n and lists the commands executable via sudo.\n\n This module also inspects each command and reports potential avenues\n for privileged code execution due to poor file system permissions or\n permitting execution of executables known to be useful for privesc,\n such as utilities designed for file read/write, user modification,\n or execution of arbitrary operating system commands.\n\n Note, you may need to provide the password for the session user.",
"references": [
],
"is_server": false,
"is_client": false,
"platform": "BSD,Linux,OSX,Solaris,Unix",
"arch": "",
"rport": "",
"targets": null,
"mod_time": "2018-05-25 04:20:25 +0000",
"path": "/modules/post/multi/recon/sudo_commands.rb",
"is_install_path": true,
"ref_name": "multi/recon/sudo_commands"
},
"post_osx/admin/say": {
"name": "OS X Text to Speech Utility",
"full_name": "post/osx/admin/say",