Add US-Cert references to all these SCADA modules. The refers are based on this list:

http://www.scadahacker.com/resources/msf-scada.html
unstable
sinn3r 2011-12-20 14:07:29 -06:00
parent d439390aa2
commit baaa1f6c82
14 changed files with 15 additions and 2 deletions

View File

@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'CVE', '2011-3492'],
[ 'OSVDB', '75496'],
[ 'URL', 'http://aluigi.altervista.org/adv/daqfactory_1-adv.txt'],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-264-01.pdf']
],
'DefaultOptions' =>
{

View File

@ -38,6 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['OSVDB', '72812'],
['URL', 'http://aluigi.altervista.org/adv/factorylink_1-adv.txt'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-091-01.pdf']
],
'Payload' =>
{

View File

@ -38,7 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['OSVDB', '72815'],
['URL', 'http://aluigi.altervista.org/adv/factorylink_4-adv.txt']
['URL', 'http://aluigi.altervista.org/adv/factorylink_4-adv.txt'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-091-01.pdf']
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['URL', 'http://aluigi.org/adv/genesis_4-adv.txt'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf']
],
'Payload' =>
{

View File

@ -39,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
['OSVDB', '72135'],
['URL', 'http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf'],
['URL', 'http://www.exploit-db.com/exploits/17240/'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-02.pdf']
],
'Payload' =>
{

View File

@ -42,6 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2011-1567'],
['OSVDB', '72353'],
['URL', 'http://aluigi.altervista.org/adv/igss_2-adv.txt'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-132-01A.pdf']
],
'Payload' =>
{

View File

@ -45,6 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2011-1567'],
['OSVDB', '72352'],
['URL', 'http://aluigi.altervista.org/adv/igss_5-adv.txt'],
['URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-132-01A.pdf']
],
'Payload' =>
{

View File

@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '72349'],
[ 'URL', 'http://aluigi.altervista.org/adv/igss_1-adv.txt' ], #Write File packet flaw
[ 'URL', 'http://aluigi.altervista.org/adv/igss_8-adv.txt' ], #EXE packet flaw
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-132-01A.pdf']
],
'DefaultOptions' =>
{

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'OSVDB', '69027'],
[ 'URL', 'http://www.reversemode.com/index.php?option=com_content&task=view&id=70&Itemid=' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICS-Alert-10-293-02.pdf' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-301-01A.pdf' ],
],
'DefaultOptions' =>
{

View File

@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '72826'],
[ 'BID', '46937'],
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_5-adv.txt' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-110-01.pdf']
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -41,6 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '72824'],
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_2-adv.txt' ],
[ 'URL', 'http://www.dataconline.com/software/realwin.php' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-110-01.pdf']
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '68812' ],
[ 'CVE', '2010-4142' ],
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_1-adv.txt' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-313-01.pdf']
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '68812' ],
[ 'CVE', '2010-4142' ],
[ 'URL', 'http://aluigi.altervista.org/adv/realwin_1-adv.txt' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-10-313-01.pdf']
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'CVE', '2011-0517' ],
[ 'OSVDB', '70418'],
[ 'URL', 'http://aluigi.org/adv/winlog_1-adv.txt' ],
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-017-02.pdf']
],
'Privileged' => false,
'DefaultOptions' =>