Skip to content

Commit 5d7197d

Browse files
committed
Moved shout outs, organized includes
include Msf::Exploit::Remote::Tcp must precede the include for the Scanner mixin -- otherwise you end up with some undesired effects, like having an RHOST and RHOSTS on the datastore. Also, took out the block of shout outs and gave references and credits to the people / url's mentioned.
1 parent 99d145e commit 5d7197d

File tree

1 file changed

+14
-16
lines changed

1 file changed

+14
-16
lines changed

modules/auxiliary/scanner/sap/sap_router_info_request.rb

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,34 +5,32 @@
55
# http://metasploit.com/framework/
66
##
77

8-
##
9-
# This module is based on, inspired by, or is a port of a plugin available in
10-
# the Onapsis Bizploit Opensource ERP Penetration Testing framework -
11-
# http://www.onapsis.com/research-free-solutions.php.
12-
# Mariano Nunez (the author of the Bizploit framework) helped me in my efforts
13-
# in producing the Metasploit modules and was happy to share his knowledge and
14-
# experience - a very cool guy. I'd also like to thank Chris John Riley,
15-
# Ian de Villiers and Joris van de Vis who have Beta tested the modules and
16-
# provided excellent feedback. Some people just seem to enjoy hacking SAP :)
17-
##
18-
198
require 'msf/core'
209

2110
class Metasploit4 < Msf::Auxiliary
2211

12+
include Msf::Exploit::Remote::Tcp
2313
include Msf::Auxiliary::Report
2414
include Msf::Auxiliary::Scanner
25-
include Msf::Exploit::Remote::Tcp
2615

2716
def initialize
2817
super(
2918
'Name' => 'SAPRouter Admin Request',
3019
'Description' => %q{
31-
SAPRouter Admin Request (display remote route information).
32-
http://help.sap.com/saphelp_nw70ehp3/helpdata/en/48/6c68b01d5a350ce10000000a42189d/content.htm
20+
Display remote route information.
3321
},
34-
'References' => [[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ]],
35-
'Author' => [ 'nmonkee' ],
22+
'References' => [
23+
[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ],
24+
[ 'URL', 'http://help.sap.com/saphelp_nw70ehp3/helpdata/en/48/6c68b01d5a350ce10000000a42189d/content.htm'],
25+
[ 'URL', 'http://www.onapsis.com/research-free-solutions.php' ] # Bizsploit Opensource ERP Pentesting Framework
26+
],
27+
'Author' => [
28+
'nomnkee',
29+
'Mariano Nunez', # Wrote Bizploit, helped on this module, very cool guy
30+
'Chris John Riley', # Testing
31+
'Ian de Villiers', # Testing
32+
'Joris van de Vis' # Testing
33+
],
3634
'License' => BSD_LICENSE
3735
)
3836
register_options(

0 commit comments

Comments
 (0)