Sets svn keywords on modules missing it, tweaks the emailer module

git-svn-id: file:///home/svn/framework3/trunk@6407 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-03-28 06:03:35 +00:00
parent a655aa29a6
commit eccfcdfced
32 changed files with 48 additions and 42 deletions

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-0795' ],

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Tomcat Administration Tool default access',
'Version' => '$Revision: $',
'Version' => '$Revision$',
'Description' => 'Detect Tomcat Administration Tool default access.',
'References' =>
[

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Tomcat Application Manager default access',
'Version' => '$Revision: $',
'Version' => '$Revision$',
'Description' => 'Detect Tomcat Web Application Manager default access.',
'References' =>
[

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-5448' ],

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '30172'],

View File

@ -22,8 +22,9 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => 'Generic Emailer (SMTP)',
'Description' => %q{
Based on Jabra spl0it.org email script for social engineering,
this module simply sends emails.
This module can be used to automate email delivery.
This code is based on Joshua Abraham's email script for social
engineering.
},
'License' => MSF_LICENSE,
'Version' => '$Revision$',
@ -37,15 +38,15 @@ class Metasploit3 < Msf::Auxiliary
[
OptString.new('RHOST', [true, "SMTP server address",'127.0.0.1']),
OptString.new('RPORT', [true, "SMTP server port",'25']),
OptString.new('MAILTO', [false, "DO NOT MODIFY",'nil@nil.nil']),
OptString.new('YAML_CONFIG', [true, "Full path to YAML Configuration file",File.join(Msf::Config.install_root, "data","emailer_config.yaml")]),
], self.class)
# Hide this option from the user
deregister_options('MAILTO')
end
def run
fileconf = File.open(datastore['YAML_CONFIG'])
yamlconf = YAML::load(fileconf)
@ -123,4 +124,4 @@ class Metasploit3 < Msf::Auxiliary
end
end

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP Options Detection',
'Version' => '$Revision: $',
'Version' => '$Revision$',
'Description' => 'Display available HTTP options for each system',
'Author' => ['CG'],
'License' => MSF_LICENSE

View File

@ -1,5 +1,5 @@
##
# $Id: wmap_backup_file.rb 5869 2008-11-10 04:38:05Z et $
# $Id$
##
##
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -28,7 +28,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 5789 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'HTTP SSL Certificate tester',
'Version' => '$Revision: 6022 $',
'Version' => '$Revision$',
'Description' => 'Display vhost associated to server using SSL certificate and check for signature algorithm',
'Author' => 'et',
'License' => MSF_LICENSE

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
},
'Author' => [ 'et [at] metasploit . com' ],
'License' => BSD_LICENSE,
'Version' => '$Revision: 5979 $'))
'Version' => '$Revision$'))
register_options(
[

View File

@ -44,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Wardialer',
'Version' => '$Revision: 1 $',
'Version' => '$Revision$',
'Description' => 'Scan for dial-up systems that are connected to modems and answer telephony indials.',
'Author' => [ 'I)ruid' ],
'License' => MSF_LICENSE

View File

@ -99,7 +99,12 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class)
end
# Need to perform target detection
def autofilter
false
end
def brute_exploit(target_addrs)
if(not @nops)
@ -213,4 +218,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
This exploit connects to a system's modem over dialup and provides
the user with a readout of the login banner.
},
'Version' => '$Revision: 1 $',
'Version' => '$Revision$',
'Author' =>
[
'I)ruid',

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '40478'],

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
['OSVDB', '28456'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '12705' ],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'License' => MSF_LICENSE,
'Author' => [ 'MC' ],
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2009-0187' ],

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'License' => 'MSF_LICENSE',
'Author' => [ 'MC' ],
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '32860' ],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'License' => 'MSF_LICENSE',
'Author' => [ 'MC' ],
'Version' => '$Revision: $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-4654' ],

View File

@ -1,5 +1,5 @@
##
# $Id: generic.rb 5773 2008-10-19 21:03:39Z ramon $
# $Id$
##
##
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Nop
super(
'Name' => 'TTY Nop Generator',
'Alias' => 'tty_generic',
'Version' => '$Revision: 5773 $',
'Version' => '$Revision$',
'Description' => 'Generates harmless padding for TTY input',
'Author' => 'hdm',
'License' => MSF_LICENSE,

View File

@ -1,5 +1,5 @@
##
# $Id: interact.rb 5773 2008-10-19 21:03:39Z ramon $
# $Id$
##
##
@ -22,7 +22,7 @@ module Metasploit3
def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix TTY, Interact with established connection',
'Version' => '$Revision: 5773 $',
'Version' => '$Revision$',
'Description' => 'Interacts with a TTY on an established socket connection',
'Author' => 'hdm',
'License' => MSF_LICENSE,

View File

@ -36,4 +36,4 @@ module Metasploit3
))
end
end
end

View File

@ -37,4 +37,4 @@ module Metasploit3
))
end
end
end

View File

@ -36,4 +36,4 @@ module Metasploit3
))
end
end
end

View File

@ -79,4 +79,4 @@ module Metasploit3
))
end
end
end

View File

@ -43,4 +43,4 @@ module Metasploit3
))
end
end
end

View File

@ -72,4 +72,4 @@ module Metasploit3
))
end
end
end