Fixed author name in modules for myself.
git-svn-id: file:///home/svn/framework3/trunk@12292 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
a82c47789d
commit
e9e8026832
|
@ -22,7 +22,7 @@ class Msf::Module::Author
|
||||||
'cazz' => 'bmc' + 0x40.chr + 'shmoo.com',
|
'cazz' => 'bmc' + 0x40.chr + 'shmoo.com',
|
||||||
'pusscat' => 'pusscat' + 0x40.chr + 'metasploit.com',
|
'pusscat' => 'pusscat' + 0x40.chr + 'metasploit.com',
|
||||||
'skylined' => 'skylined' + 0x40.chr + 'edup.tudelft.nl',
|
'skylined' => 'skylined' + 0x40.chr + 'edup.tudelft.nl',
|
||||||
'patrick' => 'patrick' + 0x40.chr + 'aushack.com',
|
'patrick' => 'patrick' + 0x40.chr + 'osisecurity.com.au',
|
||||||
'ramon' => 'ramon' + 0x40.chr + 'risesecurity.org',
|
'ramon' => 'ramon' + 0x40.chr + 'risesecurity.org',
|
||||||
'I)ruid' => 'druid' + 0x40.chr + 'caughq.org',
|
'I)ruid' => 'druid' + 0x40.chr + 'caughq.org',
|
||||||
'egypt' => 'egypt' + 0x40.chr + 'metasploit.com',
|
'egypt' => 'egypt' + 0x40.chr + 'metasploit.com',
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
This module exploits a format string overflow in the BolinTech
|
This module exploits a format string overflow in the BolinTech
|
||||||
Dream FTP Server version 1.02. Based on the exploit by SkyLined.
|
Dream FTP Server version 1.02. Based on the exploit by SkyLined.
|
||||||
},
|
},
|
||||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
'Author' => [ 'patrick' ],
|
||||||
'Arch' => [ ARCH_X86 ],
|
'Arch' => [ ARCH_X86 ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
client that is triggered through an excessively long PASV reply command. This
|
client that is triggered through an excessively long PASV reply command. This
|
||||||
module was ported from the original exploit by drG4njubas with minor improvements.
|
module was ported from the original exploit by drG4njubas with minor improvements.
|
||||||
},
|
},
|
||||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
'Author' => [ 'patrick' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
This module exploits a buffer overflow in the PSO Proxy v0.91 web server.
|
This module exploits a buffer overflow in the PSO Proxy v0.91 web server.
|
||||||
If a client sends an excessively long string the stack is overwritten.
|
If a client sends an excessively long string the stack is overwritten.
|
||||||
},
|
},
|
||||||
'Author' => 'Patrick Webster <patrick@aushack.com>',
|
'Author' => [ 'patrick' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
Telnet service. The stack is overwritten when sending an overly
|
Telnet service. The stack is overwritten when sending an overly
|
||||||
long address to the 'ping' command.
|
long address to the 'ping' command.
|
||||||
},
|
},
|
||||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
'Author' => [ 'patrick' ],
|
||||||
'Arch' => [ ARCH_X86 ],
|
'Arch' => [ ARCH_X86 ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
This module exploits the MailCarrier v2.51 suite SMTP service.
|
This module exploits the MailCarrier v2.51 suite SMTP service.
|
||||||
The stack is overwritten when sending an overly long EHLO command.
|
The stack is overwritten when sending an overly long EHLO command.
|
||||||
},
|
},
|
||||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
'Author' => [ 'patrick' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
Other versions may also be affected. The service terminates after exploitation,
|
Other versions may also be affected. The service terminates after exploitation,
|
||||||
so you only get one chance!
|
so you only get one chance!
|
||||||
},
|
},
|
||||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
'Author' => [ 'patrick' ],
|
||||||
'Arch' => [ ARCH_X86 ],
|
'Arch' => [ ARCH_X86 ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a
|
This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a
|
||||||
request (get/write) for an overly long file name.
|
request (get/write) for an overly long file name.
|
||||||
},
|
},
|
||||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
'Author' => [ 'patrick' ],
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
|
Loading…
Reference in New Issue