Make the post module titles consist

git-svn-id: file:///home/svn/framework3/trunk@11824 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2011-02-25 21:00:33 +00:00
parent b712be8949
commit f79f704a68
14 changed files with 21 additions and 21 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Get environment', 'Name' => 'Generic Operating System Environment Settings',
'Description' => %q{ Print out environment variables }, 'Description' => %q{ Print out environment variables },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ],

View File

@ -23,10 +23,10 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Mac OS X Information Enumeration', 'Name' => 'Mac OS X System Information Enumeration',
'Description' => %q{ 'Description' => %q{
This module does initial gathering of information from OSX Tiger, Leopard This module gathers basic system information from Mac OS X Tiger, Leopard
and Snow Leopard System and Snow Leopard systems.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,8 +21,8 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Keylog Recorder', 'Name' => 'Microsoft Windows Keystroke Recorder',
'Description' => %q{ Records keyloger data to a log file.}, 'Description' => %q{ Records keystroke logs to a file.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
'Version' => '$Revision$', 'Version' => '$Revision$',

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows UAC Protection Bypass', 'Name' => 'Microsoft Windows UAC Protection Bypass',
'Description' => %q{ 'Description' => %q{
This module will bypass Windows UAC by utilizing the trusted publisher This module will bypass Windows UAC by utilizing the trusted publisher
certificate through process injection. It will spawn a second shell that certificate through process injection. It will spawn a second shell that

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
include ::Msf::Post::WindowsServices include ::Msf::Post::WindowsServices
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Service Permissions Local Privilege Escalation', 'Name' => 'Microsoft Windows Service Permissions Local Privilege Escalation',
'Description' => %q{ 'Description' => %q{
Many services are configured with insecure permissions. This Many services are configured with insecure permissions. This
module attempts to create a service, then searches through a list of module attempts to create a service, then searches through a list of

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Determine whether the session is a virtual machine', 'Name' => 'Microsoft Windows Virtual Environment Detection',
'Description' => %q{ 'Description' => %q{
Examines various attributes of the victim host to Examines various attributes of the victim host to
determine if it is a virtual machine and if so displays determine if it is a virtual machine and if so displays

View File

@ -19,8 +19,8 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Enumerate Installed Applications', 'Name' => 'Microsoft Windows Installed Application Enumeration',
'Description' => %q{ This module will enumerate installed application on a target host}, 'Description' => %q{ This module will enumerate installed applications on a target host},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
'Version' => '$Revision$', 'Version' => '$Revision$',

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Enumerate logged on users', 'Name' => 'Microsoft Windows Logged On User Enumeration (Registry)',
'Description' => %q{ This module will enumerate current and recent logged on users}, 'Description' => %q{ This module will enumerate current and recent logged on users},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Enumerate Powershell Enviroment', 'Name' => 'Microsoft Windows Powershell Enviroment Setting Enumeration',
'Description' => %q{ This module will enumerate Microsofts Powershell Settings on a target host}, 'Description' => %q{ This module will enumerate Microsofts Powershell Settings on a target host},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Local SMB Share Enumeration via Registry', 'Name' => 'Microsoft Windows SMB Share Enumeration via Registry',
'Description' => %q{ This module will enumerate configured and recently used file shares}, 'Description' => %q{ This module will enumerate configured and recently used file shares},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Enumerate SNMP Configuration', 'Name' => 'Microsoft Windows SNMP Settings Enumeration (registry)',
'Description' => %q{ This module will enumerate the SNMP Configuration on a target host.}, 'Description' => %q{ This module will enumerate the SNMP Configuration on a target host.},
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'], 'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'],

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Hashdump', 'Name' => 'Microsoft Windows Local User Account Password Hashes (Registry)',
'Description' => %q{ Pull the syskey out of the remote registry and decrypt the SAM database }, 'Description' => %q{ Pull the syskey out of the remote registry and decrypt the SAM database },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'hdm' ], 'Author' => [ 'hdm' ],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Windows Account SID Resolver', 'Name' => 'Microsoft Windows Local User Account SID Lookup',
'Description' => %q{ This module prints information about a given SID from the perspective of this session }, 'Description' => %q{ This module prints information about a given SID from the perspective of this session },
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'], 'Author' => [ 'chao-mu'],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Delete User', 'Name' => 'Microsoft Windows Local User Account Deletion',
'Description' => %q{ Deletes a user account from the given server (or local if none given)}, 'Description' => %q{ Deletes a user account from the given server (or local if none given)},
'License' => BSD_LICENSE, 'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'], 'Author' => [ 'chao-mu'],