Sets svn keywords on modules missing it, tweaks the emailer module
git-svn-id: file:///home/svn/framework3/trunk@6407 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
a655aa29a6
commit
eccfcdfced
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'MC' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2004-0795' ],
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Tomcat Administration Tool default access',
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect Tomcat Administration Tool default access.',
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Tomcat Application Manager default access',
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Detect Tomcat Web Application Manager default access.',
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'MC' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-5448' ],
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '30172'],
|
||||
|
|
|
@ -22,8 +22,9 @@ class Metasploit3 < Msf::Auxiliary
|
|||
super(update_info(info,
|
||||
'Name' => 'Generic Emailer (SMTP)',
|
||||
'Description' => %q{
|
||||
Based on Jabra spl0it.org email script for social engineering,
|
||||
this module simply sends emails.
|
||||
This module can be used to automate email delivery.
|
||||
This code is based on Joshua Abraham's email script for social
|
||||
engineering.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
|
@ -37,15 +38,15 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
OptString.new('RHOST', [true, "SMTP server address",'127.0.0.1']),
|
||||
OptString.new('RPORT', [true, "SMTP server port",'25']),
|
||||
OptString.new('MAILTO', [false, "DO NOT MODIFY",'nil@nil.nil']),
|
||||
OptString.new('YAML_CONFIG', [true, "Full path to YAML Configuration file",File.join(Msf::Config.install_root, "data","emailer_config.yaml")]),
|
||||
], self.class)
|
||||
|
||||
|
||||
# Hide this option from the user
|
||||
deregister_options('MAILTO')
|
||||
end
|
||||
|
||||
def run
|
||||
|
||||
|
||||
|
||||
fileconf = File.open(datastore['YAML_CONFIG'])
|
||||
yamlconf = YAML::load(fileconf)
|
||||
|
||||
|
@ -123,4 +124,4 @@ class Metasploit3 < Msf::Auxiliary
|
|||
end
|
||||
end
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP Options Detection',
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Display available HTTP options for each system',
|
||||
'Author' => ['CG'],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
##
|
||||
# $Id: wmap_backup_file.rb 5869 2008-11-10 04:38:05Z et $
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] cyberspace.org' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 5869 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -28,7 +28,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 5789 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 5869 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 5869 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'HTTP SSL Certificate tester',
|
||||
'Version' => '$Revision: 6022 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Display vhost associated to server using SSL certificate and check for signature algorithm',
|
||||
'Author' => 'et',
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit.com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 5869 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
},
|
||||
'Author' => [ 'et [at] metasploit . com' ],
|
||||
'License' => BSD_LICENSE,
|
||||
'Version' => '$Revision: 5979 $'))
|
||||
'Version' => '$Revision$'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -44,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'Wardialer',
|
||||
'Version' => '$Revision: 1 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Scan for dial-up systems that are connected to modems and answer telephony indials.',
|
||||
'Author' => [ 'I)ruid' ],
|
||||
'License' => MSF_LICENSE
|
||||
|
|
|
@ -99,7 +99,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
], self.class)
|
||||
|
||||
end
|
||||
|
||||
|
||||
# Need to perform target detection
|
||||
def autofilter
|
||||
false
|
||||
end
|
||||
|
||||
def brute_exploit(target_addrs)
|
||||
|
||||
if(not @nops)
|
||||
|
@ -213,4 +218,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
This exploit connects to a system's modem over dialup and provides
|
||||
the user with a readout of the login banner.
|
||||
},
|
||||
'Version' => '$Revision: 1 $',
|
||||
'Version' => '$Revision$',
|
||||
'Author' =>
|
||||
[
|
||||
'I)ruid',
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '40478'],
|
||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '28456'],
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' => [ 'MC' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '12705' ],
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'MC' ],
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-0187' ],
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'License' => 'MSF_LICENSE',
|
||||
'Author' => [ 'MC' ],
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'BID', '32860' ],
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'License' => 'MSF_LICENSE',
|
||||
'Author' => [ 'MC' ],
|
||||
'Version' => '$Revision: $',
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-4654' ],
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
##
|
||||
# $Id: generic.rb 5773 2008-10-19 21:03:39Z ramon $
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Nop
|
|||
super(
|
||||
'Name' => 'TTY Nop Generator',
|
||||
'Alias' => 'tty_generic',
|
||||
'Version' => '$Revision: 5773 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Generates harmless padding for TTY input',
|
||||
'Author' => 'hdm',
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
##
|
||||
# $Id: interact.rb 5773 2008-10-19 21:03:39Z ramon $
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
|
@ -22,7 +22,7 @@ module Metasploit3
|
|||
def initialize(info = {})
|
||||
super(merge_info(info,
|
||||
'Name' => 'Unix TTY, Interact with established connection',
|
||||
'Version' => '$Revision: 5773 $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Interacts with a TTY on an established socket connection',
|
||||
'Author' => 'hdm',
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -36,4 +36,4 @@ module Metasploit3
|
|||
))
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -37,4 +37,4 @@ module Metasploit3
|
|||
))
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -36,4 +36,4 @@ module Metasploit3
|
|||
))
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -79,4 +79,4 @@ module Metasploit3
|
|||
))
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -43,4 +43,4 @@ module Metasploit3
|
|||
))
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -72,4 +72,4 @@ module Metasploit3
|
|||
))
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue