Sets svn keywords on modules missing it, tweaks the emailer module

git-svn-id: file:///home/svn/framework3/trunk@6407 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2009-03-28 06:03:35 +00:00
parent a655aa29a6
commit eccfcdfced
32 changed files with 48 additions and 42 deletions

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2004-0795' ], [ 'CVE', '2004-0795' ],

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Tomcat Administration Tool default access', 'Name' => 'Tomcat Administration Tool default access',
'Version' => '$Revision: $', 'Version' => '$Revision$',
'Description' => 'Detect Tomcat Administration Tool default access.', 'Description' => 'Detect Tomcat Administration Tool default access.',
'References' => 'References' =>
[ [

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Tomcat Application Manager default access', 'Name' => 'Tomcat Application Manager default access',
'Version' => '$Revision: $', 'Version' => '$Revision$',
'Description' => 'Detect Tomcat Web Application Manager default access.', 'Description' => 'Detect Tomcat Web Application Manager default access.',
'References' => 'References' =>
[ [

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2008-5448' ], [ 'CVE', '2008-5448' ],

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '30172'], ['OSVDB', '30172'],

View File

@ -22,8 +22,9 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info, super(update_info(info,
'Name' => 'Generic Emailer (SMTP)', 'Name' => 'Generic Emailer (SMTP)',
'Description' => %q{ 'Description' => %q{
Based on Jabra spl0it.org email script for social engineering, This module can be used to automate email delivery.
this module simply sends emails. This code is based on Joshua Abraham's email script for social
engineering.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
@ -37,15 +38,15 @@ class Metasploit3 < Msf::Auxiliary
[ [
OptString.new('RHOST', [true, "SMTP server address",'127.0.0.1']), OptString.new('RHOST', [true, "SMTP server address",'127.0.0.1']),
OptString.new('RPORT', [true, "SMTP server port",'25']), OptString.new('RPORT', [true, "SMTP server port",'25']),
OptString.new('MAILTO', [false, "DO NOT MODIFY",'nil@nil.nil']),
OptString.new('YAML_CONFIG', [true, "Full path to YAML Configuration file",File.join(Msf::Config.install_root, "data","emailer_config.yaml")]), OptString.new('YAML_CONFIG', [true, "Full path to YAML Configuration file",File.join(Msf::Config.install_root, "data","emailer_config.yaml")]),
], self.class) ], self.class)
# Hide this option from the user
deregister_options('MAILTO')
end end
def run def run
fileconf = File.open(datastore['YAML_CONFIG']) fileconf = File.open(datastore['YAML_CONFIG'])
yamlconf = YAML::load(fileconf) yamlconf = YAML::load(fileconf)
@ -123,4 +124,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'], [ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP Options Detection', 'Name' => 'HTTP Options Detection',
'Version' => '$Revision: $', 'Version' => '$Revision$',
'Description' => 'Display available HTTP options for each system', 'Description' => 'Display available HTTP options for each system',
'Author' => ['CG'], 'Author' => ['CG'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -1,5 +1,5 @@
## ##
# $Id: wmap_backup_file.rb 5869 2008-11-10 04:38:05Z et $ # $Id$
## ##
## ##
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] cyberspace.org' ], 'Author' => [ 'et [at] cyberspace.org' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -28,7 +28,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 5789 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'HTTP SSL Certificate tester', 'Name' => 'HTTP SSL Certificate tester',
'Version' => '$Revision: 6022 $', 'Version' => '$Revision$',
'Description' => 'Display vhost associated to server using SSL certificate and check for signature algorithm', 'Description' => 'Display vhost associated to server using SSL certificate and check for signature algorithm',
'Author' => 'et', 'Author' => 'et',
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit.com' ], 'Author' => [ 'et [at] metasploit.com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 5869 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
}, },
'Author' => [ 'et [at] metasploit . com' ], 'Author' => [ 'et [at] metasploit . com' ],
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Version' => '$Revision: 5979 $')) 'Version' => '$Revision$'))
register_options( register_options(
[ [

View File

@ -44,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Wardialer', 'Name' => 'Wardialer',
'Version' => '$Revision: 1 $', 'Version' => '$Revision$',
'Description' => 'Scan for dial-up systems that are connected to modems and answer telephony indials.', 'Description' => 'Scan for dial-up systems that are connected to modems and answer telephony indials.',
'Author' => [ 'I)ruid' ], 'Author' => [ 'I)ruid' ],
'License' => MSF_LICENSE 'License' => MSF_LICENSE

View File

@ -99,7 +99,12 @@ class Metasploit3 < Msf::Exploit::Remote
], self.class) ], self.class)
end end
# Need to perform target detection
def autofilter
false
end
def brute_exploit(target_addrs) def brute_exploit(target_addrs)
if(not @nops) if(not @nops)
@ -213,4 +218,4 @@ class Metasploit3 < Msf::Exploit::Remote
end end
end end

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
This exploit connects to a system's modem over dialup and provides This exploit connects to a system's modem over dialup and provides
the user with a readout of the login banner. the user with a readout of the login banner.
}, },
'Version' => '$Revision: 1 $', 'Version' => '$Revision$',
'Author' => 'Author' =>
[ [
'I)ruid', 'I)ruid',

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '40478'], ['OSVDB', '40478'],

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ], 'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
['OSVDB', '28456'], ['OSVDB', '28456'],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', '12705' ], [ 'BID', '12705' ],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2009-0187' ], [ 'CVE', '2009-0187' ],

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'License' => 'MSF_LICENSE', 'License' => 'MSF_LICENSE',
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'BID', '32860' ], [ 'BID', '32860' ],

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'License' => 'MSF_LICENSE', 'License' => 'MSF_LICENSE',
'Author' => [ 'MC' ], 'Author' => [ 'MC' ],
'Version' => '$Revision: $', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2008-4654' ], [ 'CVE', '2008-4654' ],

View File

@ -1,5 +1,5 @@
## ##
# $Id: generic.rb 5773 2008-10-19 21:03:39Z ramon $ # $Id$
## ##
## ##
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Nop
super( super(
'Name' => 'TTY Nop Generator', 'Name' => 'TTY Nop Generator',
'Alias' => 'tty_generic', 'Alias' => 'tty_generic',
'Version' => '$Revision: 5773 $', 'Version' => '$Revision$',
'Description' => 'Generates harmless padding for TTY input', 'Description' => 'Generates harmless padding for TTY input',
'Author' => 'hdm', 'Author' => 'hdm',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -1,5 +1,5 @@
## ##
# $Id: interact.rb 5773 2008-10-19 21:03:39Z ramon $ # $Id$
## ##
## ##
@ -22,7 +22,7 @@ module Metasploit3
def initialize(info = {}) def initialize(info = {})
super(merge_info(info, super(merge_info(info,
'Name' => 'Unix TTY, Interact with established connection', 'Name' => 'Unix TTY, Interact with established connection',
'Version' => '$Revision: 5773 $', 'Version' => '$Revision$',
'Description' => 'Interacts with a TTY on an established socket connection', 'Description' => 'Interacts with a TTY on an established socket connection',
'Author' => 'hdm', 'Author' => 'hdm',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -36,4 +36,4 @@ module Metasploit3
)) ))
end end
end end

View File

@ -37,4 +37,4 @@ module Metasploit3
)) ))
end end
end end

View File

@ -36,4 +36,4 @@ module Metasploit3
)) ))
end end
end end

View File

@ -79,4 +79,4 @@ module Metasploit3
)) ))
end end
end end

View File

@ -43,4 +43,4 @@ module Metasploit3
)) ))
end end
end end

View File

@ -72,4 +72,4 @@ module Metasploit3
)) ))
end end
end end