From e9e802683291478911843f31c0aa026374675cc6 Mon Sep 17 00:00:00 2001 From: Patrick Webster Date: Mon, 11 Apr 2011 02:25:36 +0000 Subject: [PATCH] Fixed author name in modules for myself. git-svn-id: file:///home/svn/framework3/trunk@12292 4d416f70-5f16-0410-b530-b9f4589650da --- lib/msf/core/module/author.rb | 2 +- modules/exploits/windows/ftp/dreamftp_format.rb | 2 +- modules/exploits/windows/ftp/leapftp_pasv_reply.rb | 2 +- modules/exploits/windows/http/psoproxy91_overflow.rb | 2 +- modules/exploits/windows/proxy/ccproxy_telnet_ping.rb | 2 +- modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb | 2 +- modules/exploits/windows/telnet/gamsoft_telsrv_username.rb | 2 +- modules/exploits/windows/tftp/attftp_long_filename.rb | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/lib/msf/core/module/author.rb b/lib/msf/core/module/author.rb index 803dcb0b19..3f69df1c76 100644 --- a/lib/msf/core/module/author.rb +++ b/lib/msf/core/module/author.rb @@ -22,7 +22,7 @@ class Msf::Module::Author 'cazz' => 'bmc' + 0x40.chr + 'shmoo.com', 'pusscat' => 'pusscat' + 0x40.chr + 'metasploit.com', 'skylined' => 'skylined' + 0x40.chr + 'edup.tudelft.nl', - 'patrick' => 'patrick' + 0x40.chr + 'aushack.com', + 'patrick' => 'patrick' + 0x40.chr + 'osisecurity.com.au', 'ramon' => 'ramon' + 0x40.chr + 'risesecurity.org', 'I)ruid' => 'druid' + 0x40.chr + 'caughq.org', 'egypt' => 'egypt' + 0x40.chr + 'metasploit.com', diff --git a/modules/exploits/windows/ftp/dreamftp_format.rb b/modules/exploits/windows/ftp/dreamftp_format.rb index a2ec384e5a..57e11a4863 100644 --- a/modules/exploits/windows/ftp/dreamftp_format.rb +++ b/modules/exploits/windows/ftp/dreamftp_format.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a format string overflow in the BolinTech Dream FTP Server version 1.02. Based on the exploit by SkyLined. }, - 'Author' => [ 'Patrick Webster ' ], + 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', diff --git a/modules/exploits/windows/ftp/leapftp_pasv_reply.rb b/modules/exploits/windows/ftp/leapftp_pasv_reply.rb index 9f9ff4b70a..7d42685c50 100644 --- a/modules/exploits/windows/ftp/leapftp_pasv_reply.rb +++ b/modules/exploits/windows/ftp/leapftp_pasv_reply.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote client that is triggered through an excessively long PASV reply command. This module was ported from the original exploit by drG4njubas with minor improvements. }, - 'Author' => [ 'Patrick Webster ' ], + 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'References' => diff --git a/modules/exploits/windows/http/psoproxy91_overflow.rb b/modules/exploits/windows/http/psoproxy91_overflow.rb index 12b1e60dff..dde589e10c 100644 --- a/modules/exploits/windows/http/psoproxy91_overflow.rb +++ b/modules/exploits/windows/http/psoproxy91_overflow.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a buffer overflow in the PSO Proxy v0.91 web server. If a client sends an excessively long string the stack is overwritten. }, - 'Author' => 'Patrick Webster ', + 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'References' => diff --git a/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb b/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb index f3dd2cd880..15e3f1b974 100644 --- a/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb +++ b/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb @@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote Telnet service. The stack is overwritten when sending an overly long address to the 'ping' command. }, - 'Author' => [ 'Patrick Webster ' ], + 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', diff --git a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb index fa3de5d028..4b2d3768d2 100644 --- a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb +++ b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb @@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits the MailCarrier v2.51 suite SMTP service. The stack is overwritten when sending an overly long EHLO command. }, - 'Author' => [ 'Patrick Webster ' ], + 'Author' => [ 'patrick' ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'References' => diff --git a/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb b/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb index f2e4e18f09..496ffaa02c 100644 --- a/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb +++ b/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb @@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote Other versions may also be affected. The service terminates after exploitation, so you only get one chance! }, - 'Author' => [ 'Patrick Webster ' ], + 'Author' => [ 'patrick' ], 'Arch' => [ ARCH_X86 ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', diff --git a/modules/exploits/windows/tftp/attftp_long_filename.rb b/modules/exploits/windows/tftp/attftp_long_filename.rb index e0f11a32d4..bf8004dd72 100644 --- a/modules/exploits/windows/tftp/attftp_long_filename.rb +++ b/modules/exploits/windows/tftp/attftp_long_filename.rb @@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name. }, - 'Author' => [ 'Patrick Webster ' ], + 'Author' => [ 'patrick' ], 'Version' => '$Revision$', 'References' => [