You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/post/windows/gather/credentials/adi_irc.rb
+2-3Lines changed: 2 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,6 @@
4
4
##
5
5
6
6
classMetasploitModule < Msf::Post
7
-
# this associative array defines the artifacts known to PackRat
8
7
includeMsf::Post::File
9
8
includeMsf::Post::Windows::UserProfiles
10
9
includeMsf::Post::Windows::Packrat
@@ -53,7 +52,7 @@ def initialize(info = {})
53
52
PackRat is a post-exploitation module that gathers file and information artifacts from end users' systems.
54
53
PackRat searches for and downloads files of interest (such as config files, and received and deleted emails) and extracts information (such as contacts and usernames and passwords), using regexp, JSON, XML, and SQLite queries.
55
54
Further details can be found in the module documentation.
56
-
This is a module that searches for credentials stored on AdiIRC Client in a windows remote host.
55
+
This module searches for credentials stored on AdiIRC Client in a windows remote host.
Copy file name to clipboardExpand all lines: modules/post/windows/gather/credentials/aim.rb
+2-5Lines changed: 2 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,9 @@
1
-
# frozen_string_literal: true
2
-
3
1
##
4
2
# This module requires Metasploit: https://metasploit.com/download
5
3
# Current source: https://github.com/rapid7/metasploit-framework
6
4
##
7
5
8
6
classMetasploitModule < Msf::Post
9
-
# this associative array defines the artifacts known to PackRat
10
7
includeMsf::Post::File
11
8
includeMsf::Post::Windows::UserProfiles
12
9
includeMsf::Post::Windows::Packrat
@@ -79,7 +76,7 @@ def initialize(info = {})
79
76
PackRat is a post-exploitation module that gathers file and information artifacts from end users' systems.
80
77
PackRat searches for and downloads files of interest (such as config files, and received and deleted emails) and extracts information (such as contacts and usernames and passwords), using regexp, JSON, XML, and SQLite queries.
81
78
Further details can be found in the module documentation.
82
-
This is a module that searches for Aim credentials on a windows remote host.
79
+
This module searches for Aim credentials on a Windows host.
Copy file name to clipboardExpand all lines: modules/post/windows/gather/credentials/carotdav_ftp.rb
+2-3Lines changed: 2 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,6 @@
4
4
##
5
5
6
6
classMetasploitModule < Msf::Post
7
-
# this associative array defines the artifacts known to PackRat
8
7
includeMsf::Post::File
9
8
includeMsf::Post::Windows::UserProfiles
10
9
includeMsf::Post::Windows::Packrat
@@ -45,7 +44,7 @@ def initialize(info = {})
45
44
PackRat is a post-exploitation module that gathers file and information artifacts from end users' systems.
46
45
PackRat searches for and downloads files of interest (such as config files, and received and deleted emails) and extracts information (such as contacts and usernames and passwords), using regexp, JSON, XML, and SQLite queries.
47
46
Further details can be found in the module documentation.
48
-
This is a module that searches for credentials stored on CarotDAV FTP Client in a windows remote host.
47
+
This module searches for credentials stored on CarotDAV FTP Client in a windows remote host.
Copy file name to clipboardExpand all lines: modules/post/windows/gather/credentials/chrome.rb
+2-6Lines changed: 2 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,12 @@
1
-
# frozen_string_literal: true
2
-
3
1
##
4
2
# This module requires Metasploit: https://metasploit.com/download
5
3
# Current source: https://github.com/rapid7/metasploit-framework
6
4
##
7
5
8
6
classMetasploitModule < Msf::Post
9
-
# this associative array defines the artifacts known to PackRat
10
7
includeMsf::Post::File
11
8
includeMsf::Post::Windows::UserProfiles
12
9
includeMsf::Post::Windows::Packrat
13
-
14
10
includeMsf::Exploit::Deprecated
15
11
16
12
deprecatednil,'The post/windows/gather/enum_browsers module now supersedes this module'
@@ -97,7 +93,7 @@ def initialize(info = {})
97
93
PackRat is a post-exploitation module that gathers file and information artifacts from end users' systems.
98
94
PackRat searches for and downloads files of interest (such as config files, and received and deleted emails) and extracts information (such as contacts and usernames and passwords), using regexp, JSON, XML, and SQLite queries.
99
95
Further details can be found in the module documentation.
100
-
This is a module that searches for credentials stored on Chrome in a windows remote host.
96
+
This module searches for credentials stored on Chrome in a windows remote host.
Copy file name to clipboardExpand all lines: modules/post/windows/gather/credentials/comodo.rb
+9-8Lines changed: 9 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,13 @@
1
-
# frozen_string_literal: true
2
-
3
1
##
4
2
# This module requires Metasploit: https://metasploit.com/download
5
3
# Current source: https://github.com/rapid7/metasploit-framework
6
4
##
7
5
8
6
classMetasploitModule < Msf::Post
9
-
# this associative array defines the artifacts known to PackRat
10
7
includeMsf::Post::File
11
8
includeMsf::Post::Windows::UserProfiles
12
9
includeMsf::Post::Windows::Packrat
10
+
13
11
ARTIFACTS=
14
12
{
15
13
application: 'comodo',
@@ -127,7 +125,7 @@ def initialize(info = {})
127
125
PackRat is a post-exploitation module that gathers file and information artifacts from end users' systems.
128
126
PackRat searches for and downloads files of interest (such as config files, and received and deleted emails) and extracts information (such as contacts and usernames and passwords), using regexp, JSON, XML, and SQLite queries.
129
127
Further details can be found in the module documentation.
130
-
This is a module that searches for credentials stored in Comodo on a windows remote host.
128
+
This module searches for credentials stored in Comodo on a remote Windows host.
131
129
},
132
130
'License'=>MSF_LICENSE,
133
131
'Author'=>[
@@ -153,9 +151,12 @@ def initialize(info = {})
153
151
OptBool.new('EXTRACT_DATA',[false,'Extract data and stores in a separate file',true]),
154
152
# enumerates the options based on the artifacts that are defined below
155
153
OptEnum.new('ARTIFACTS',[
156
-
false,'Type of artifacts to collect','All',ARTIFACTS[:gatherable_artifacts].mapdo |k|
Copy file name to clipboardExpand all lines: modules/post/windows/gather/credentials/coolnovo.rb
+3-5Lines changed: 3 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,9 @@
1
-
# frozen_string_literal: true
2
-
3
1
##
4
2
# This module requires Metasploit: https://metasploit.com/download
5
3
# Current source: https://github.com/rapid7/metasploit-framework
6
4
##
7
5
8
6
classMetasploitModule < Msf::Post
9
-
# this associative array defines the artifacts known to PackRat
10
7
includeMsf::Post::File
11
8
includeMsf::Post::Windows::UserProfiles
12
9
includeMsf::Post::Windows::Packrat
@@ -48,6 +45,7 @@ class MetasploitModule < Msf::Post
48
45
49
46
]
50
47
}.freeze
48
+
51
49
definitialize(info={})
52
50
super(
53
51
update_info(
@@ -57,7 +55,7 @@ def initialize(info = {})
57
55
PackRat is a post-exploitation module that gathers file and information artifacts from end users' systems.
58
56
PackRat searches for and downloads files of interest (such as config files, and received and deleted emails) and extracts information (such as contacts and usernames and passwords), using regexp, JSON, XML, and SQLite queries.
59
57
Further details can be found in the module documentation.
60
-
This is a module that searches for Coolnovo credentials on a windows remote host.
58
+
This module searches for Coolnovo credentials on a Windows host.
0 commit comments