File tree Expand file tree Collapse file tree 9 files changed +24
-31
lines changed
post/windows/gather/credentials Expand file tree Collapse file tree 9 files changed +24
-31
lines changed Original file line number Diff line number Diff line change @@ -91,7 +91,7 @@ def run
91
91
:port => rport ,
92
92
:user => row [ 0 ] ,
93
93
:pass => row [ 2 ] ,
94
- :type => "hash " ,
94
+ :type => "mysql_hash " ,
95
95
:sname => "mysql" ,
96
96
:active => true
97
97
} )
Original file line number Diff line number Diff line change @@ -22,17 +22,14 @@ def initialize
22
22
super (
23
23
'Name' => 'SMB File Delete Utility' ,
24
24
'Description' => %Q{
25
- This module deletes a file from a target share and path. The only reason
26
- to use this module is if your existing SMB client is not able to support the features
27
- of the Metasploit Framework that you need, like pass-the-hash authentication.
25
+ This module deletes a file from a target share and path. The usual reason
26
+ to use this module is to work around limitations in an existing SMB client that may not
27
+ be able to take advantage of pass-the-hash style authentication.
28
28
} ,
29
29
'Author' =>
30
30
[
31
31
'mubix' # copied from hdm upload_file module
32
32
] ,
33
- 'References' =>
34
- [
35
- ] ,
36
33
'License' => MSF_LICENSE
37
34
)
38
35
Original file line number Diff line number Diff line change @@ -22,17 +22,14 @@ def initialize
22
22
super (
23
23
'Name' => 'SMB File Download Utility' ,
24
24
'Description' => %Q{
25
- This module downloads a file from a target share and path. The only reason
26
- to use this module is if your existing SMB client is not able to support the features
27
- of the Metasploit Framework that you need, like pass-the-hash authentication.
25
+ This module deletes a file from a target share and path. The usual reason
26
+ to use this module is to work around limitations in an existing SMB client that may not
27
+ be able to take advantage of pass-the-hash style authentication.
28
28
} ,
29
29
'Author' =>
30
30
[
31
31
'mubix' # copied from hdm upload_file module
32
32
] ,
33
- 'References' =>
34
- [
35
- ] ,
36
33
'License' => MSF_LICENSE
37
34
)
38
35
Original file line number Diff line number Diff line change @@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'Node.js HTTP Pipelining DoS ' ,
16
+ 'Name' => 'Node.js HTTP Pipelining Denial of Service ' ,
17
17
'Description' => %q{
18
- This module exploits a DoS in the HTTP parser of Node.js versions
18
+ This module exploits a Denial of Service ( DoS) condition in the HTTP parser of Node.js versions
19
19
released before 0.10.21 and 0.8.26. The attack sends many pipelined
20
20
HTTP requests on a single connection, which causes unbounded memory
21
21
allocation when the client does not read the responses.
Original file line number Diff line number Diff line change @@ -19,9 +19,10 @@ class Metasploit3 < Msf::Auxiliary
19
19
20
20
def initialize ( info = { } )
21
21
super ( update_info ( info ,
22
- 'Name' => 'Jenkins Vulnerability Scanner ' ,
22
+ 'Name' => 'Jenkins Enumeration ' ,
23
23
'Description' => %q{
24
- This module scans a Jenkins installation for a few vulnerabilities.
24
+ This module enumerates a remote Jenkins installation in an unauthenticated manner, including
25
+ host operating system and and Jenkins installation details.
25
26
} ,
26
27
'Author' => 'Jeff McCutchan' ,
27
28
'License' => MSF_LICENSE
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ def initialize(info = {})
16
16
super ( update_info ( info ,
17
17
'Name' => 'D-Link DIR-605L Captcha Handling Buffer Overflow' ,
18
18
'Description' => %q{
19
- This module exploits an anonymous remote code execution on D-Link DIR-605L routers. The
19
+ This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
20
20
vulnerability exists while handling user supplied captcha information, and is due to the
21
21
insecure usage of sprintf on the getAuthCode() function. This module has been tested
22
22
successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.
Original file line number Diff line number Diff line change @@ -19,9 +19,9 @@ def initialize(info={})
19
19
super ( update_info ( info ,
20
20
'Name' => 'Mac OS X Persistent Payload Installer' ,
21
21
'Description' => %q{
22
- This module provides a persistence boot payload by creating a plist entry
22
+ This module provides a persistent boot payload by creating a plist entry
23
23
in current user's ~/Library/LaunchAgents directory. Whenever the user logs in,
24
- the LaunchAgent will be invoked and our dropped payload will run.
24
+ the LaunchAgent will be invoked and this dropped payload will run.
25
25
} ,
26
26
'License' => MSF_LICENSE ,
27
27
'Author' => [ "Marcin 'Icewall' Noga <marcin[at]icewall.pl>" , "joev" ] ,
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ def initialize(info = {})
17
17
'Description' => %q{
18
18
This module exploits a remote command-injection vulnerability in EMC Replication Manager
19
19
client (irccd.exe). By sending a specially crafted message invoking RunProgram function an
20
- attacker may be able to execute arbitrary code commands with SYSTEM privileges. Affected
20
+ attacker may be able to execute arbitrary commands with SYSTEM privileges. Affected
21
21
products are EMC Replication Manager < 5.3. This module has been successfully tested
22
22
against EMC Replication Manager 5.2.1 on XP/W2003. EMC Networker Module for Microsoft
23
23
Applications 2.1 and 2.2 may be vulnerable too although this module have not been tested
Original file line number Diff line number Diff line change 1
1
##
2
- # This file is part of the Metasploit Framework and may be subject to
3
- # redistribution and commercial restrictions. Please see the Metasploit
4
- # web site for more information on licensing and terms of use.
5
- # http://metasploit.com/
2
+ # This module requires Metasploit: http//metasploit.com/download
3
+ # Current source: https://github.com/rapid7/metasploit-framework
6
4
##
7
5
8
6
require 'msf/core'
@@ -15,16 +13,16 @@ class Metasploit3 < Msf::Post
15
13
16
14
def initialize ( info = { } )
17
15
super ( update_info ( info ,
18
- 'Name' => 'Windows Single Sign On Credential Collector (Mimikatz)' ,
19
- 'Description' => %q{
16
+ 'Name' => 'Windows Single Sign On Credential Collector (Mimikatz)' ,
17
+ 'Description' => %q{
20
18
This module will collect cleartext Single Sign On credentials from the Local
21
19
Security Authority using the Mimikatz extension. Blank passwords will not be stored
22
20
in the database.
23
21
} ,
24
- 'License' => MSF_LICENSE ,
25
- 'Author' => [ 'Ben Campbell <eat_meatballs[at]hotmail.co.uk>' ] ,
26
- 'Platform' => [ 'win' ] ,
27
- 'SessionTypes' => [ 'meterpreter' ]
22
+ 'License' => MSF_LICENSE ,
23
+ 'Author' => [ 'Ben Campbell <eat_meatballs[at]hotmail.co.uk>' ] ,
24
+ 'Platform' => [ 'win' ] ,
25
+ 'SessionTypes' => [ 'meterpreter' ]
28
26
) )
29
27
end
30
28
You can’t perform that action at this time.
0 commit comments