Fixed author name in modules for myself.

git-svn-id: file:///home/svn/framework3/trunk@12292 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Patrick Webster 2011-04-11 02:25:36 +00:00
parent a82c47789d
commit e9e8026832
8 changed files with 8 additions and 8 deletions

View File

@ -22,7 +22,7 @@ class Msf::Module::Author
'cazz' => 'bmc' + 0x40.chr + 'shmoo.com',
'pusscat' => 'pusscat' + 0x40.chr + 'metasploit.com',
'skylined' => 'skylined' + 0x40.chr + 'edup.tudelft.nl',
'patrick' => 'patrick' + 0x40.chr + 'aushack.com',
'patrick' => 'patrick' + 0x40.chr + 'osisecurity.com.au',
'ramon' => 'ramon' + 0x40.chr + 'risesecurity.org',
'I)ruid' => 'druid' + 0x40.chr + 'caughq.org',
'egypt' => 'egypt' + 0x40.chr + 'metasploit.com',

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a format string overflow in the BolinTech
Dream FTP Server version 1.02. Based on the exploit by SkyLined.
},
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
'Author' => [ 'patrick' ],
'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
client that is triggered through an excessively long PASV reply command. This
module was ported from the original exploit by drG4njubas with minor improvements.
},
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a buffer overflow in the PSO Proxy v0.91 web server.
If a client sends an excessively long string the stack is overwritten.
},
'Author' => 'Patrick Webster <patrick@aushack.com>',
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
Telnet service. The stack is overwritten when sending an overly
long address to the 'ping' command.
},
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
'Author' => [ 'patrick' ],
'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits the MailCarrier v2.51 suite SMTP service.
The stack is overwritten when sending an overly long EHLO command.
},
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
Other versions may also be affected. The service terminates after exploitation,
so you only get one chance!
},
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
'Author' => [ 'patrick' ],
'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a
request (get/write) for an overly long file name.
},
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
'Author' => [ 'patrick' ],
'Version' => '$Revision$',
'References' =>
[