Msftidy run over the recent changed+added modules
parent
7ec5f98480
commit
f6a6963726
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => '7-Technologies IGSS 9 IGSSdataServer.exe DoS',
|
'Name' => '7-Technologies IGSS 9 IGSSdataServer.exe DoS',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
The 7-Technologies SCADA IGSS Data Server (IGSSdataServer.exe) <= 9.0.0.10306 can be
|
The 7-Technologies SCADA IGSS Data Server (IGSSdataServer.exe) <= 9.0.0.10306 can be
|
||||||
brought down by sending a crafted TCP packet to port 12401. This should also work
|
brought down by sending a crafted TCP packet to port 12401. This should also work
|
||||||
for version <= 9.0.0.1120, but that version hasn't been tested.
|
for version <= 9.0.0.1120, but that version hasn't been tested.
|
||||||
},
|
},
|
||||||
|
|
|
@ -63,7 +63,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
{
|
{
|
||||||
'uri' => uri,
|
'uri' => uri,
|
||||||
'method' => 'GET',
|
'method' => 'GET',
|
||||||
'vars_get' =>
|
'vars_get' =>
|
||||||
{
|
{
|
||||||
'company_name' => datastore['COMPANY_NAME'],
|
'company_name' => datastore['COMPANY_NAME'],
|
||||||
'limit' => datastore['LIMIT'],
|
'limit' => datastore['LIMIT'],
|
||||||
|
@ -132,8 +132,8 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
end
|
end
|
||||||
|
|
||||||
def grab_text(e, name)
|
def grab_text(e, name)
|
||||||
(e.get_elements(name) && e.get_elements(name)[0] &&
|
(e.get_elements(name) && e.get_elements(name)[0] &&
|
||||||
e.get_elements(name)[0].get_text ) ?
|
e.get_elements(name)[0].get_text ) ?
|
||||||
e.get_elements(name)[0].get_text.to_s : ""
|
e.get_elements(name)[0].get_text.to_s : ""
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
|
@ -44,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def support_ipv6?
|
def support_ipv6?
|
||||||
false
|
false
|
||||||
end
|
end
|
||||||
|
|
||||||
def resolve(ip)
|
def resolve(ip)
|
||||||
results = ''
|
results = ''
|
||||||
apikey = datastore['HTTPBL_APIKEY']
|
apikey = datastore['HTTPBL_APIKEY']
|
||||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module will test vmauthd logins on a range of machines and
|
This module will test vmauthd logins on a range of machines and
|
||||||
report successful logins.
|
report successful logins.
|
||||||
},
|
},
|
||||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||||
'References' =>
|
'References' =>
|
||||||
|
|
|
@ -78,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
client.core.use("stdapi") if not client.ext.aliases.include?("stdapi")
|
client.core.use("stdapi") if not client.ext.aliases.include?("stdapi")
|
||||||
|
|
||||||
cmd = "C:\\windows\\system32\\attrib.exe -r " +
|
cmd = "C:\\windows\\system32\\attrib.exe -r " +
|
||||||
"C:\\windows\\system32\\wbem\\mof\\good\\" + @var_mof_name + ".mof"
|
"C:\\windows\\system32\\wbem\\mof\\good\\" + @var_mof_name + ".mof"
|
||||||
|
|
||||||
client.sys.process.execute(cmd, nil, {'Hidden' => true })
|
client.sys.process.execute(cmd, nil, {'Hidden' => true })
|
||||||
|
|
||||||
|
|
|
@ -321,7 +321,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
return xml
|
return xml
|
||||||
end
|
end
|
||||||
|
|
||||||
def u3d_pad(str, char="\x00")
|
def u3d_pad(str, char="\x00")
|
||||||
len = str.length % 4
|
len = str.length % 4
|
||||||
if (len > 0)
|
if (len > 0)
|
||||||
#puts "Adding %d pad bytes" % (4 - len)
|
#puts "Adding %d pad bytes" % (4 - len)
|
||||||
|
@ -385,7 +385,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
3, # Bone Index (no Quantized Weight)
|
3, # Bone Index (no Quantized Weight)
|
||||||
# 2
|
# 2
|
||||||
0x55550000, # Bone Weight Count
|
0x55550000, # Bone Weight Count
|
||||||
0x4c1df36e, # Bone Index
|
0x4c1df36e, # Bone Index
|
||||||
0x0200d002, # Quantized Weight
|
0x0200d002, # Quantized Weight
|
||||||
# 3
|
# 3
|
||||||
0x95000074, # Bone Weight Count
|
0x95000074, # Bone Weight Count
|
||||||
|
@ -397,7 +397,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
#bone_weight = [0xffffff44,bone_weight_data.length,0].pack('VVV')
|
#bone_weight = [0xffffff44,bone_weight_data.length,0].pack('VVV')
|
||||||
bone_weight << bone_weight_data
|
bone_weight << bone_weight_data
|
||||||
|
|
||||||
new_objtype1_data =
|
new_objtype1_data =
|
||||||
"\x05\x00\x52\x52\x52\x52\x52\x01\x00\x00\x00\xa6\x04\xa8\x96\xb9\x3f\xc5\x43\xb2\xdf\x2a"+
|
"\x05\x00\x52\x52\x52\x52\x52\x01\x00\x00\x00\xa6\x04\xa8\x96\xb9\x3f\xc5\x43\xb2\xdf\x2a"+
|
||||||
"\x31\xb5\x56\x93\x40\x00\x01\x00\x00\x00\x00\x00\x00\x05\x00\x52\x52\x52\x52\x52\x01\x00"+
|
"\x31\xb5\x56\x93\x40\x00\x01\x00\x00\x00\x00\x00\x00\x05\x00\x52\x52\x52\x52\x52\x01\x00"+
|
||||||
"\x00\x00\x01\x00\x2e\x01\x00\x76\x00\x00\x00\x00"
|
"\x00\x00\x01\x00\x2e\x01\x00\x76\x00\x00\x00\x00"
|
||||||
|
@ -651,4 +651,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
pdf << "%%EOF" << eol
|
pdf << "%%EOF" << eol
|
||||||
end
|
end
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue