Make the post module titles consist

git-svn-id: file:///home/svn/framework3/trunk@11824 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2011-02-25 21:00:33 +00:00
parent b712be8949
commit f79f704a68
14 changed files with 21 additions and 21 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Get environment',
'Name' => 'Generic Operating System Environment Settings',
'Description' => %q{ Print out environment variables },
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'egypt' ],

View File

@ -23,10 +23,10 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Mac OS X Information Enumeration',
'Name' => 'Mac OS X System Information Enumeration',
'Description' => %q{
This module does initial gathering of information from OSX Tiger, Leopard
and Snow Leopard System
This module gathers basic system information from Mac OS X Tiger, Leopard
and Snow Leopard systems.
},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -21,8 +21,8 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Keylog Recorder',
'Description' => %q{ Records keyloger data to a log file.},
'Name' => 'Microsoft Windows Keystroke Recorder',
'Description' => %q{ Records keystroke logs to a file.},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
'Version' => '$Revision$',

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows UAC Protection Bypass',
'Name' => 'Microsoft Windows UAC Protection Bypass',
'Description' => %q{
This module will bypass Windows UAC by utilizing the trusted publisher
certificate through process injection. It will spawn a second shell that

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
include ::Msf::Post::WindowsServices
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Service Permissions Local Privilege Escalation',
'Name' => 'Microsoft Windows Service Permissions Local Privilege Escalation',
'Description' => %q{
Many services are configured with insecure permissions. This
module attempts to create a service, then searches through a list of

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Determine whether the session is a virtual machine',
'Name' => 'Microsoft Windows Virtual Environment Detection',
'Description' => %q{
Examines various attributes of the victim host to
determine if it is a virtual machine and if so displays

View File

@ -19,8 +19,8 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Enumerate Installed Applications',
'Description' => %q{ This module will enumerate installed application on a target host},
'Name' => 'Microsoft Windows Installed Application Enumeration',
'Description' => %q{ This module will enumerate installed applications on a target host},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],
'Version' => '$Revision$',

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Enumerate logged on users',
'Name' => 'Microsoft Windows Logged On User Enumeration (Registry)',
'Description' => %q{ This module will enumerate current and recent logged on users},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Enumerate Powershell Enviroment',
'Name' => 'Microsoft Windows Powershell Enviroment Setting Enumeration',
'Description' => %q{ This module will enumerate Microsofts Powershell Settings on a target host},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Local SMB Share Enumeration via Registry',
'Name' => 'Microsoft Windows SMB Share Enumeration via Registry',
'Description' => %q{ This module will enumerate configured and recently used file shares},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>'],

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Enumerate SNMP Configuration',
'Name' => 'Microsoft Windows SNMP Settings Enumeration (registry)',
'Description' => %q{ This module will enumerate the SNMP Configuration on a target host.},
'License' => MSF_LICENSE,
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>', 'Tebo <tebo[at]attackresearch.com>'],

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Hashdump',
'Name' => 'Microsoft Windows Local User Account Password Hashes (Registry)',
'Description' => %q{ Pull the syskey out of the remote registry and decrypt the SAM database },
'License' => MSF_LICENSE,
'Author' => [ 'hdm' ],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Account SID Resolver',
'Name' => 'Microsoft Windows Local User Account SID Lookup',
'Description' => %q{ This module prints information about a given SID from the perspective of this session },
'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'],

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Delete User',
'Name' => 'Microsoft Windows Local User Account Deletion',
'Description' => %q{ Deletes a user account from the given server (or local if none given)},
'License' => BSD_LICENSE,
'Author' => [ 'chao-mu'],