File tree Expand file tree Collapse file tree 4 files changed +8
-7
lines changed Expand file tree Collapse file tree 4 files changed +8
-7
lines changed Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
14
14
15
15
def initialize ( info = { } )
16
16
super ( update_info ( info ,
17
- 'Name' => 'Monkey HTTPD Header Parsing Denial-of- Service' ,
17
+ 'Name' => 'Monkey HTTPD Header Parsing Denial of Service (DoS) ' ,
18
18
'Description' => %q{
19
19
This module causes improper header parsing that leads to a segmentation fault
20
20
due to a specially crafted HTTP request. Affects version <= 1.2.0.
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
17
17
18
18
def initialize ( info = { } )
19
19
super ( update_info ( info ,
20
- 'Name' => 'InfoVista VistaPortal Application Brute Force Login Utility' ,
20
+ 'Name' => 'InfoVista VistaPortal Application Bruteforce Login Utility' ,
21
21
'Description' => %{
22
22
This module attempts to scan for InfoVista VistaPortal Web Application, finds its
23
23
version and performs login brute force to identify valid credentials.
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
16
16
17
17
def initialize ( info = { } )
18
18
super ( update_info ( info ,
19
- 'Name' => 'RFCode Reader Web Interface Login Utility' ,
19
+ 'Name' => 'RFCode Reader Web Interface Login / Bruteforce Utility' ,
20
20
'Description' => %{
21
21
This module simply attempts to login to a RFCode Reader web interface.
22
22
Please note that by default there is no authentication. In such a case, password brute force will not be performed.
Original file line number Diff line number Diff line change @@ -28,10 +28,11 @@ def initialize(info = {})
28
28
an attacker can execute arbitrary code in the context of a browser user.
29
29
This flaw was fixed in Oct. 2012 and affects JRE <= 1.6.35 and <= 1.7.07.
30
30
31
- In order for this module to work, it must be ran as root on a server that
32
- does not serve SMB. Additionally, the target host must have the WebClient
33
- service (WebDAV Mini-Redirector) enabled. Alternatively an UNC path containing
34
- a jvm.dll can be specified with an own SMB server.
31
+ In order for this module to work, it must be run as root on a server that
32
+ does not serve SMB (In most cases, this means non-Windows hosts). Additionally,
33
+ the target host must have the WebClient service (WebDAV Mini-Redirector) enabled.
34
+ Alternatively, a UNC path containing a jvm.dll can be specified, bypassing
35
+ the Windows limitation for the Metasploit host.
35
36
} ,
36
37
'Author' =>
37
38
[
You can’t perform that action at this time.
0 commit comments