automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-07-06 13:10:12 -07:00
parent 1c448de882
commit af3d2045fb
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 39 additions and 2 deletions

View File

@ -23239,6 +23239,43 @@
"is_install_path": true,
"ref_name": "scanner/smb/impacket/dcomexec"
},
"auxiliary_scanner/smb/impacket/secretsdump": {
"name": "DCOM Exec",
"full_name": "auxiliary/scanner/smb/impacket/secretsdump",
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"Alberto Solino",
"Spencer McIntyre"
],
"description": "Performs various techniques to dump hashes from the remote machine\n without executing any agent there. For SAM and LSA Secrets (including\n cached creds) we try to read as much as we can from the registry and\n then we save the hives in the target system (%SYSTEMROOT%\\Temp dir) and\n read the rest of the data from there.",
"references": [
"URL-https://github.com/gentilkiwi/kekeo/tree/master/dcsync",
"URL-http://moyix.blogspot.com.ar/2008/02/syskey-and-sam.html",
"URL-http://moyix.blogspot.com.ar/2008/02/decrypting-lsa-secrets.html",
"URL-http://moyix.blogspot.com.ar/2008/02/cached-domain-credentials.html",
"URL-http://www.quarkslab.com/en-blog+read+13",
"URL-https://code.google.com/p/creddump/",
"URL-http://lab.mediaservice.net/code/cachedump.rb",
"URL-http://insecurety.net/?p=768",
"URL-http://www.beginningtoseethelight.org/ntsecurity/index.htm",
"URL-http://www.ntdsxtract.com/downloads/ActiveDirectoryOfflineHashDumpAndForensics.pdf",
"URL-http://www.passcape.com/index.php?section=blog&cmd=details&id=15",
"URL-https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py",
"AKA-secretsdump.py"
],
"is_server": false,
"is_client": false,
"platform": "",
"arch": "",
"rport": "",
"targets": null,
"mod_time": "2018-05-27 17:12:06 +0000",
"path": "/modules/auxiliary/scanner/smb/impacket/secretsdump.py",
"is_install_path": true,
"ref_name": "scanner/smb/impacket/secretsdump"
},
"auxiliary_scanner/smb/impacket/wmiexec": {
"name": "WMI Exec",
"full_name": "auxiliary/scanner/smb/impacket/wmiexec",
@ -35412,7 +35449,7 @@
"name": "HID discoveryd command_blink_on Unauthenticated RCE",
"full_name": "exploit/linux/misc/hid_discoveryd_command_blink_on_unauth_rce",
"rank": 600,
"disclosure_date": "2016-03-28",
"disclosure_date": "2016-03-28 00:00:00 +0000",
"type": "exploit",
"author": [
"Ricky \"HeadlessZeke\" Lawshae",
@ -39782,7 +39819,7 @@
"name": "GitList v0.6.0 Argument Injection Vulnerability",
"full_name": "exploit/multi/http/gitlist_arg_injection",
"rank": 600,
"disclosure_date": "2018-04-26",
"disclosure_date": "2018-04-26 00:00:00 +0000",
"type": "exploit",
"author": [
"Kacper Szurek",