Add US-Cert references to all these SCADA modules. The refers are based on this list:
http://www.scadahacker.com/resources/msf-scada.htmlunstable
parent
d439390aa2
commit
baaa1f6c82
|
@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2011-3492'],
|
||||
[ 'OSVDB', '75496'],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/daqfactory_1-adv.txt'],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-264-01.pdf']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -38,6 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['OSVDB', '72812'],
|
||||
['URL', 'http://aluigi.altervista.org/adv/factorylink_1-adv.txt'],
|
||||
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-091-01.pdf']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -38,7 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['OSVDB', '72815'],
|
||||
['URL', 'http://aluigi.altervista.org/adv/factorylink_4-adv.txt']
|
||||
['URL', 'http://aluigi.altervista.org/adv/factorylink_4-adv.txt'],
|
||||
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-091-01.pdf']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['URL', 'http://aluigi.org/adv/genesis_4-adv.txt'],
|
||||
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '72135'],
|
||||
['URL', 'http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf'],
|
||||
['URL', 'http://www.exploit-db.com/exploits/17240/'],
|
||||
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -42,6 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2011-1567'],
|
||||
['OSVDB', '72353'],
|
||||
['URL', 'http://aluigi.altervista.org/adv/igss_2-adv.txt'],
|
||||
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-132-01A.pdf']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -45,6 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2011-1567'],
|
||||
['OSVDB', '72352'],
|
||||
['URL', 'http://aluigi.altervista.org/adv/igss_5-adv.txt'],
|
||||
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-132-01A.pdf']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'OSVDB', '72349'],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/igss_1-adv.txt' ], #Write File packet flaw
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/igss_8-adv.txt' ], #EXE packet flaw
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-132-01A.pdf']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'OSVDB', '69027'],
|
||||
[ 'URL', 'http://www.reversemode.com/index.php?option=com_content&task=view&id=70&Itemid=' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-Alert-10-293-02.pdf' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-301-01A.pdf' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
|
@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'OSVDB', '72826'],
|
||||
[ 'BID', '46937'],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_5-adv.txt' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-110-01.pdf']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -41,6 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'OSVDB', '72824'],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_2-adv.txt' ],
|
||||
[ 'URL', 'http://www.dataconline.com/software/realwin.php' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-110-01.pdf']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'OSVDB', '68812' ],
|
||||
[ 'CVE', '2010-4142' ],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_1-adv.txt' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-313-01.pdf']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'OSVDB', '68812' ],
|
||||
[ 'CVE', '2010-4142' ],
|
||||
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_1-adv.txt' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-313-01.pdf']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2011-0517' ],
|
||||
[ 'OSVDB', '70418'],
|
||||
[ 'URL', 'http://aluigi.org/adv/winlog_1-adv.txt' ],
|
||||
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-017-02.pdf']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DefaultOptions' =>
|
||||
|
|
Loading…
Reference in New Issue