Make the post module titles consist
git-svn-id: file:///home/svn/framework3/trunk@11824 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
b712be8949
commit
f79f704a68
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Get environment',
|
||||
'Name' => 'Generic Operating System Environment Settings',
|
||||
'Description' => %q{ Print out environment variables },
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ],
|
||||
|
|
|
@ -23,10 +23,10 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Mac OS X Information Enumeration',
|
||||
'Name' => 'Mac OS X System Information Enumeration',
|
||||
'Description' => %q{
|
||||
This module does initial gathering of information from OSX Tiger, Leopard
|
||||
and Snow Leopard System
|
||||
This module gathers basic system information from Mac OS X Tiger, Leopard
|
||||
and Snow Leopard systems.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||
|
@ -570,4 +570,4 @@ class Metasploit3 < Msf::Post
|
|||
end
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -21,8 +21,8 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Keylog Recorder',
|
||||
'Description' => %q{ Records keyloger data to a log file.},
|
||||
'Name' => 'Microsoft Windows Keystroke Recorder',
|
||||
'Description' => %q{ Records keystroke logs to a file.},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||
'Version' => '$Revision$',
|
||||
|
@ -206,4 +206,4 @@ class Metasploit3 < Msf::Post
|
|||
end
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows UAC Protection Bypass',
|
||||
'Name' => 'Microsoft Windows UAC Protection Bypass',
|
||||
'Description' => %q{
|
||||
This module will bypass Windows UAC by utilizing the trusted publisher
|
||||
certificate through process injection. It will spawn a second shell that
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
|||
include ::Msf::Post::WindowsServices
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Service Permissions Local Privilege Escalation',
|
||||
'Name' => 'Microsoft Windows Service Permissions Local Privilege Escalation',
|
||||
'Description' => %q{
|
||||
Many services are configured with insecure permissions. This
|
||||
module attempts to create a service, then searches through a list of
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Determine whether the session is a virtual machine',
|
||||
'Name' => 'Microsoft Windows Virtual Environment Detection',
|
||||
'Description' => %q{
|
||||
Examines various attributes of the victim host to
|
||||
determine if it is a virtual machine and if so displays
|
||||
|
|
|
@ -19,8 +19,8 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Enumerate Installed Applications',
|
||||
'Description' => %q{ This module will enumerate installed application on a target host},
|
||||
'Name' => 'Microsoft Windows Installed Application Enumeration',
|
||||
'Description' => %q{ This module will enumerate installed applications on a target host},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||
'Version' => '$Revision$',
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Enumerate logged on users',
|
||||
'Name' => 'Microsoft Windows Logged On User Enumeration (Registry)',
|
||||
'Description' => %q{ This module will enumerate current and recent logged on users},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Enumerate Powershell Enviroment',
|
||||
'Name' => 'Microsoft Windows Powershell Enviroment Setting Enumeration',
|
||||
'Description' => %q{ This module will enumerate Microsofts Powershell Settings on a target host},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Local SMB Share Enumeration via Registry',
|
||||
'Name' => 'Microsoft Windows SMB Share Enumeration via Registry',
|
||||
'Description' => %q{ This module will enumerate configured and recently used file shares},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Enumerate SNMP Configuration',
|
||||
'Name' => 'Microsoft Windows SNMP Settings Enumeration (registry)',
|
||||
'Description' => %q{ This module will enumerate the SNMP Configuration on a target host.},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'],
|
||||
|
@ -158,4 +158,4 @@ class Metasploit3 < Msf::Post
|
|||
print_status("\tCommunity Strings can be accessed from any host")
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Hashdump',
|
||||
'Name' => 'Microsoft Windows Local User Account Password Hashes (Registry)',
|
||||
'Description' => %q{ Pull the syskey out of the remote registry and decrypt the SAM database },
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'hdm' ],
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Account SID Resolver',
|
||||
'Name' => 'Microsoft Windows Local User Account SID Lookup',
|
||||
'Description' => %q{ This module prints information about a given SID from the perspective of this session },
|
||||
'License' => BSD_LICENSE,
|
||||
'Author' => [ 'chao-mu'],
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Delete User',
|
||||
'Name' => 'Microsoft Windows Local User Account Deletion',
|
||||
'Description' => %q{ Deletes a user account from the given server (or local if none given)},
|
||||
'License' => BSD_LICENSE,
|
||||
'Author' => [ 'chao-mu'],
|
||||
|
|
Loading…
Reference in New Issue