Skip to content

Commit 6d9833e

Browse files
author
Tod Beardsley
committed
Minor pre-release updates with descriptions
1 parent 03a1f44 commit 6d9833e

File tree

6 files changed

+19
-14
lines changed

6 files changed

+19
-14
lines changed

modules/auxiliary/admin/http/jboss_bshdeployer.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ def deploy_action(app_base, stager_name, war_data)
7979
# call the stager to deploy our real payload war
8080
stager_uri = '/' + stager_name + '/' + stager_name + '.jsp'
8181
payload_data = "#{rand_text_alpha(8+rand(8))}=#{Rex::Text.uri_encode(encoded_payload)}"
82-
print_status("#{peer} - Calling stager #{stager_uri } to deploy final payload...")
82+
print_status("#{peer} - Calling stager #{stager_uri} to deploy final payload...")
8383
res = deploy('method' => 'POST',
8484
'data' => payload_data,
8585
'uri' => stager_uri)

modules/auxiliary/scanner/ntp/ntp_peer_list_dos.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,9 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit "PEER_LIST" queries and
2121
return responses that are larger in size or greater in quantity than
22-
the request, allowing remote attackers to cause a denial of service
23-
(traffic amplification) via spoofed requests.
22+
the request, allowing remote attackers to cause a distributed, reflected
23+
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
24+
requests.
2425
},
2526
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2627
'References' =>

modules/auxiliary/scanner/ntp/ntp_peer_list_sum_dos.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,9 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
2121
return responses that are larger in size or greater in quantity than
22-
the request, allowing remote attackers to cause a denial of service
23-
(traffic amplification) via spoofed requests.
22+
the request, allowing remote attackers to cause a distributed, reflected
23+
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
24+
requests.
2425
},
2526
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2627
'References' =>

modules/auxiliary/scanner/ntp/ntp_req_nonce_dos.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,11 @@ def initialize
1818
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
1919
'Description' => %q{
2020
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
21-
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
21+
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
2222
respond to REQ_NONCE requests with a response larger than the request,
23-
allowing remote attackers to cause a denial of services (traffic
24-
amplification) via spoofed requests.
23+
allowing remote attackers to cause a distributed, reflected
24+
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
25+
requests.
2526
},
2627
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2728
'References' =>

modules/auxiliary/scanner/ntp/ntp_reslist_dos.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,11 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit "reslist" queries and
2121
obtains the list of restrictions placed on various network interfaces,
22-
networks or hosts. The reslist feature allows remote
23-
attackers to cause a denial of service (traffic amplification) via
24-
spoofed requests. The more interfaces, networks or host with specific
25-
restrictions, the greater the amplification.
22+
networks or hosts. The reslist feature allows remote
23+
attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or
24+
traffic amplification) via spoofed requests. The more interfaces, networks
25+
or hosts with specific restrictions, the greater the amplification.
26+
requests.
2627
},
2728
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2829
'References' =>

modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,9 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
2121
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
22-
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
23-
cause a denial of services (traffic amplification) via spoofed requests.
22+
respond to UNSETTRAP requests with multiple packets, allowing remote attackers
23+
to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic
24+
amplification) via spoofed requests.
2425
},
2526
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2627
'References' =>

0 commit comments

Comments
 (0)