Fixed author name in modules for myself.

git-svn-id: file:///home/svn/framework3/trunk@12292 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Patrick Webster 2011-04-11 02:25:36 +00:00
parent a82c47789d
commit e9e8026832
8 changed files with 8 additions and 8 deletions

View File

@ -22,7 +22,7 @@ class Msf::Module::Author
'cazz' => 'bmc' + 0x40.chr + 'shmoo.com', 'cazz' => 'bmc' + 0x40.chr + 'shmoo.com',
'pusscat' => 'pusscat' + 0x40.chr + 'metasploit.com', 'pusscat' => 'pusscat' + 0x40.chr + 'metasploit.com',
'skylined' => 'skylined' + 0x40.chr + 'edup.tudelft.nl', 'skylined' => 'skylined' + 0x40.chr + 'edup.tudelft.nl',
'patrick' => 'patrick' + 0x40.chr + 'aushack.com', 'patrick' => 'patrick' + 0x40.chr + 'osisecurity.com.au',
'ramon' => 'ramon' + 0x40.chr + 'risesecurity.org', 'ramon' => 'ramon' + 0x40.chr + 'risesecurity.org',
'I)ruid' => 'druid' + 0x40.chr + 'caughq.org', 'I)ruid' => 'druid' + 0x40.chr + 'caughq.org',
'egypt' => 'egypt' + 0x40.chr + 'metasploit.com', 'egypt' => 'egypt' + 0x40.chr + 'metasploit.com',

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a format string overflow in the BolinTech This module exploits a format string overflow in the BolinTech
Dream FTP Server version 1.02. Based on the exploit by SkyLined. Dream FTP Server version 1.02. Based on the exploit by SkyLined.
}, },
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ], 'Author' => [ 'patrick' ],
'Arch' => [ ARCH_X86 ], 'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
client that is triggered through an excessively long PASV reply command. This client that is triggered through an excessively long PASV reply command. This
module was ported from the original exploit by drG4njubas with minor improvements. module was ported from the original exploit by drG4njubas with minor improvements.
}, },
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a buffer overflow in the PSO Proxy v0.91 web server. This module exploits a buffer overflow in the PSO Proxy v0.91 web server.
If a client sends an excessively long string the stack is overwritten. If a client sends an excessively long string the stack is overwritten.
}, },
'Author' => 'Patrick Webster <patrick@aushack.com>', 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
Telnet service. The stack is overwritten when sending an overly Telnet service. The stack is overwritten when sending an overly
long address to the 'ping' command. long address to the 'ping' command.
}, },
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ], 'Author' => [ 'patrick' ],
'Arch' => [ ARCH_X86 ], 'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits the MailCarrier v2.51 suite SMTP service. This module exploits the MailCarrier v2.51 suite SMTP service.
The stack is overwritten when sending an overly long EHLO command. The stack is overwritten when sending an overly long EHLO command.
}, },
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ], 'Author' => [ 'patrick' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
Other versions may also be affected. The service terminates after exploitation, Other versions may also be affected. The service terminates after exploitation,
so you only get one chance! so you only get one chance!
}, },
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ], 'Author' => [ 'patrick' ],
'Arch' => [ ARCH_X86 ], 'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a
request (get/write) for an overly long file name. request (get/write) for an overly long file name.
}, },
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ], 'Author' => [ 'patrick' ],
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [