Land #5521, @todb-r7's module cleanup
commit
b23647d5ae
|
@ -9,11 +9,11 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(update_info(info,
|
||||
'Name' => 'AVTECH 744 DVR Account Information Retrieval',
|
||||
'Description' => %q{
|
||||
This module will extract the accounts information from the AVTECH 744 DVR devices,
|
||||
including all the usernames and cleartext passwords plus the device PIN, along with
|
||||
This module will extract the account information from the AVTECH 744 DVR devices,
|
||||
including usernames, cleartext passwords, and the device PIN, along with
|
||||
a few other miscellaneous details. In order to extract the information, hardcoded
|
||||
credentials admin/admin are used. These credentials can't be changed from the device
|
||||
console UI neither the web UI.
|
||||
console UI nor from the web UI.
|
||||
},
|
||||
'Author' => [ 'nstarke' ],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
This module exploits a type confusion vulnerability in the NetConnection class on
|
||||
Adobe Flash Player. When using a correct memory layout this vulnerability allows
|
||||
to corrupt arbitrary memory. It can be used to overwrite dangerous objects, like
|
||||
vectors, and finally accomplish remote code execution. This module has been tested
|
||||
vectors, and ultimately accomplish remote code execution. This module has been tested
|
||||
successfully on:
|
||||
* Windows 7 SP1 (32-bit), IE 8, IE11 and Adobe Flash 16.0.0.305.
|
||||
* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 16.0.0.305.
|
||||
|
|
Loading…
Reference in New Issue