Sets svn keywords on modules missing it, tweaks the emailer module
git-svn-id: file:///home/svn/framework3/trunk@6407 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
a655aa29a6
commit
eccfcdfced
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'MC' ],
|
'Author' => [ 'MC' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'CVE', '2004-0795' ],
|
[ 'CVE', '2004-0795' ],
|
||||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'Tomcat Administration Tool default access',
|
'Name' => 'Tomcat Administration Tool default access',
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'Description' => 'Detect Tomcat Administration Tool default access.',
|
'Description' => 'Detect Tomcat Administration Tool default access.',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'Tomcat Application Manager default access',
|
'Name' => 'Tomcat Application Manager default access',
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'Description' => 'Detect Tomcat Web Application Manager default access.',
|
'Description' => 'Detect Tomcat Web Application Manager default access.',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'MC' ],
|
'Author' => [ 'MC' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'CVE', '2008-5448' ],
|
[ 'CVE', '2008-5448' ],
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
['OSVDB', '30172'],
|
['OSVDB', '30172'],
|
||||||
|
|
|
@ -22,8 +22,9 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Generic Emailer (SMTP)',
|
'Name' => 'Generic Emailer (SMTP)',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
Based on Jabra spl0it.org email script for social engineering,
|
This module can be used to automate email delivery.
|
||||||
this module simply sends emails.
|
This code is based on Joshua Abraham's email script for social
|
||||||
|
engineering.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
|
@ -37,15 +38,15 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
[
|
[
|
||||||
OptString.new('RHOST', [true, "SMTP server address",'127.0.0.1']),
|
OptString.new('RHOST', [true, "SMTP server address",'127.0.0.1']),
|
||||||
OptString.new('RPORT', [true, "SMTP server port",'25']),
|
OptString.new('RPORT', [true, "SMTP server port",'25']),
|
||||||
OptString.new('MAILTO', [false, "DO NOT MODIFY",'nil@nil.nil']),
|
|
||||||
OptString.new('YAML_CONFIG', [true, "Full path to YAML Configuration file",File.join(Msf::Config.install_root, "data","emailer_config.yaml")]),
|
OptString.new('YAML_CONFIG', [true, "Full path to YAML Configuration file",File.join(Msf::Config.install_root, "data","emailer_config.yaml")]),
|
||||||
], self.class)
|
], self.class)
|
||||||
|
|
||||||
|
# Hide this option from the user
|
||||||
|
deregister_options('MAILTO')
|
||||||
end
|
end
|
||||||
|
|
||||||
def run
|
def run
|
||||||
|
|
||||||
|
|
||||||
fileconf = File.open(datastore['YAML_CONFIG'])
|
fileconf = File.open(datastore['YAML_CONFIG'])
|
||||||
yamlconf = YAML::load(fileconf)
|
yamlconf = YAML::load(fileconf)
|
||||||
|
|
||||||
|
@ -123,4 +124,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],
|
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],
|
||||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'HTTP Options Detection',
|
'Name' => 'HTTP Options Detection',
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'Description' => 'Display available HTTP options for each system',
|
'Description' => 'Display available HTTP options for each system',
|
||||||
'Author' => ['CG'],
|
'Author' => ['CG'],
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id: wmap_backup_file.rb 5869 2008-11-10 04:38:05Z et $
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -29,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'et [at] cyberspace.org' ],
|
'Author' => [ 'et [at] cyberspace.org' ],
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Version' => '$Revision: 5869 $'))
|
'Version' => '$Revision$'))
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
|
|
|
@ -28,7 +28,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'et [at] metasploit.com' ],
|
'Author' => [ 'et [at] metasploit.com' ],
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Version' => '$Revision: 5789 $'))
|
'Version' => '$Revision$'))
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
|
|
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'et [at] metasploit.com' ],
|
'Author' => [ 'et [at] metasploit.com' ],
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Version' => '$Revision: 5869 $'))
|
'Version' => '$Revision$'))
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
|
|
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'et [at] metasploit.com' ],
|
'Author' => [ 'et [at] metasploit.com' ],
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Version' => '$Revision: 5869 $'))
|
'Version' => '$Revision$'))
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'HTTP SSL Certificate tester',
|
'Name' => 'HTTP SSL Certificate tester',
|
||||||
'Version' => '$Revision: 6022 $',
|
'Version' => '$Revision$',
|
||||||
'Description' => 'Display vhost associated to server using SSL certificate and check for signature algorithm',
|
'Description' => 'Display vhost associated to server using SSL certificate and check for signature algorithm',
|
||||||
'Author' => 'et',
|
'Author' => 'et',
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'et [at] metasploit.com' ],
|
'Author' => [ 'et [at] metasploit.com' ],
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Version' => '$Revision: 5869 $'))
|
'Version' => '$Revision$'))
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
},
|
},
|
||||||
'Author' => [ 'et [at] metasploit . com' ],
|
'Author' => [ 'et [at] metasploit . com' ],
|
||||||
'License' => BSD_LICENSE,
|
'License' => BSD_LICENSE,
|
||||||
'Version' => '$Revision: 5979 $'))
|
'Version' => '$Revision$'))
|
||||||
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
|
|
|
@ -44,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'Wardialer',
|
'Name' => 'Wardialer',
|
||||||
'Version' => '$Revision: 1 $',
|
'Version' => '$Revision$',
|
||||||
'Description' => 'Scan for dial-up systems that are connected to modems and answer telephony indials.',
|
'Description' => 'Scan for dial-up systems that are connected to modems and answer telephony indials.',
|
||||||
'Author' => [ 'I)ruid' ],
|
'Author' => [ 'I)ruid' ],
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
|
|
|
@ -99,7 +99,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
], self.class)
|
], self.class)
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
|
# Need to perform target detection
|
||||||
|
def autofilter
|
||||||
|
false
|
||||||
|
end
|
||||||
|
|
||||||
def brute_exploit(target_addrs)
|
def brute_exploit(target_addrs)
|
||||||
|
|
||||||
if(not @nops)
|
if(not @nops)
|
||||||
|
@ -213,4 +218,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
This exploit connects to a system's modem over dialup and provides
|
This exploit connects to a system's modem over dialup and provides
|
||||||
the user with a readout of the login banner.
|
the user with a readout of the login banner.
|
||||||
},
|
},
|
||||||
'Version' => '$Revision: 1 $',
|
'Version' => '$Revision$',
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
'I)ruid',
|
'I)ruid',
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
},
|
},
|
||||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
['OSVDB', '40478'],
|
['OSVDB', '40478'],
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
},
|
},
|
||||||
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
['OSVDB', '28456'],
|
['OSVDB', '28456'],
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
},
|
},
|
||||||
'Author' => [ 'MC' ],
|
'Author' => [ 'MC' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'BID', '12705' ],
|
[ 'BID', '12705' ],
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'MC' ],
|
'Author' => [ 'MC' ],
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'CVE', '2009-0187' ],
|
[ 'CVE', '2009-0187' ],
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
},
|
},
|
||||||
'License' => 'MSF_LICENSE',
|
'License' => 'MSF_LICENSE',
|
||||||
'Author' => [ 'MC' ],
|
'Author' => [ 'MC' ],
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'BID', '32860' ],
|
[ 'BID', '32860' ],
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
},
|
},
|
||||||
'License' => 'MSF_LICENSE',
|
'License' => 'MSF_LICENSE',
|
||||||
'Author' => [ 'MC' ],
|
'Author' => [ 'MC' ],
|
||||||
'Version' => '$Revision: $',
|
'Version' => '$Revision$',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'CVE', '2008-4654' ],
|
[ 'CVE', '2008-4654' ],
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id: generic.rb 5773 2008-10-19 21:03:39Z ramon $
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Nop
|
||||||
super(
|
super(
|
||||||
'Name' => 'TTY Nop Generator',
|
'Name' => 'TTY Nop Generator',
|
||||||
'Alias' => 'tty_generic',
|
'Alias' => 'tty_generic',
|
||||||
'Version' => '$Revision: 5773 $',
|
'Version' => '$Revision$',
|
||||||
'Description' => 'Generates harmless padding for TTY input',
|
'Description' => 'Generates harmless padding for TTY input',
|
||||||
'Author' => 'hdm',
|
'Author' => 'hdm',
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
##
|
##
|
||||||
# $Id: interact.rb 5773 2008-10-19 21:03:39Z ramon $
|
# $Id$
|
||||||
##
|
##
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -22,7 +22,7 @@ module Metasploit3
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(merge_info(info,
|
super(merge_info(info,
|
||||||
'Name' => 'Unix TTY, Interact with established connection',
|
'Name' => 'Unix TTY, Interact with established connection',
|
||||||
'Version' => '$Revision: 5773 $',
|
'Version' => '$Revision$',
|
||||||
'Description' => 'Interacts with a TTY on an established socket connection',
|
'Description' => 'Interacts with a TTY on an established socket connection',
|
||||||
'Author' => 'hdm',
|
'Author' => 'hdm',
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -36,4 +36,4 @@ module Metasploit3
|
||||||
))
|
))
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -37,4 +37,4 @@ module Metasploit3
|
||||||
))
|
))
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -36,4 +36,4 @@ module Metasploit3
|
||||||
))
|
))
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -79,4 +79,4 @@ module Metasploit3
|
||||||
))
|
))
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -43,4 +43,4 @@ module Metasploit3
|
||||||
))
|
))
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -72,4 +72,4 @@ module Metasploit3
|
||||||
))
|
))
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue