Skip to content

Commit b61d1dc

Browse files
committed
Land rapid7#3763, release fixes
2 parents 16502b8 + 4abee39 commit b61d1dc

File tree

4 files changed

+29
-18
lines changed

4 files changed

+29
-18
lines changed

modules/auxiliary/admin/appletv/appletv_display_image.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ def initialize(info = {})
1515
'Description' => %q(
1616
This module will show an image on an AppleTV device for a period of time.
1717
Some AppleTV devices are actually password-protected, in that case please
18-
set the PASSWORD datastore option. If you need to bruteforce the password,
19-
you can try apple_login.rb.
18+
set the PASSWORD datastore option. For password bruteforcing, please see
19+
the module auxiliary/scanner/http/appletv_login.
2020
),
2121
'Author' =>
2222
[

modules/auxiliary/admin/appletv/appletv_display_video.rb

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,15 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'Apple TV Video Remote Control',
1616
'Description' => %q(
17-
This module plays a video on an AppleTV device. Note that AppleTV can be somewhat picky
18-
about the server that hosts the video, here are the ones tested: default IIS. default
19-
Apache, Ruby httpd webrick's default MIME list might need to be updated depending on
20-
what media file you're playing. Python SimpleHTTPServer is not recommended. Also, if
21-
you're playing a video, the URL must be an IP address. Some AppleTV devices are actually
22-
password-protected, in that case please set the PASSWORD datastore option. If you need
23-
to bruteforce the password, please use appletv_login
17+
This module plays a video on an AppleTV device. Note that
18+
AppleTV can be somewhat picky about the server that hosts the video.
19+
Tested servers include default IIS, default Apache, and Ruby's WEBrick.
20+
For WEBrick, the default MIME list may need to be updated, depending on
21+
what media file is to be played. Python SimpleHTTPServer is not
22+
recommended. Also, if you're playing a video, the URL must be an IP
23+
address. Some AppleTV devices are actually password-protected; in that
24+
case please set the PASSWORD datastore option. For password
25+
bruteforcing, please see the module auxiliary/scanner/http/appletv_login.
2426
),
2527
'Author' =>
2628
[

modules/auxiliary/scanner/http/appletv_login.rb

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,24 @@ def initialize
1616
super(
1717
'Name' => 'AppleTV AirPlay Login Utility',
1818
'Description' => %q(
19-
This module attempts to authenticate to an AppleTV service with username 'AirPlay'.
20-
The device has two different access control modes: OnScreen and Password. The difference
21-
is the password in Onscreen is number-only and four digits long, which means when you enable
22-
this option, the module will make sure to cover all of them - from 0000 to 9999.
23-
The Password mode is more complex, therefore it's better to supply your own password list
24-
in PASS_FILE, and/or enable DB_ALL_PASS and resue all the passwords you've collected in
25-
the database.
19+
This module attempts to authenticate to an AppleTV service with
20+
the username, 'AirPlay'. The device has two different access control
21+
modes: OnScreen and Password. The difference between the two is the
22+
password in OnScreen mode is numeric-only and four digits long, which
23+
means when this option is enabled, this option, the module will make
24+
sure to cover all of them - from 0000 to 9999. The Password mode is
25+
more complex, therefore the usual online bruteforce strategies apply.
2626
),
2727
'Author' =>
2828
[
2929
'0a29406d9794e4f9b30b3c5d6702c708', # Original
30-
'thelightcosine' # LoginScanner
30+
'thelightcosine' # LoginScanner conversion help
3131
],
3232
'License' => MSF_LICENSE,
33+
'References' =>
34+
[
35+
['URL', 'http://nto.github.io/AirPlay.html']
36+
],
3337
'DefaultOptions' => {
3438
'RPORT' => 7000, # AppleTV's server
3539
'STOP_ON_SUCCESS' => true # There's only one password with the same username

modules/exploits/multi/gdb/gdb_server_exec.rb

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,18 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'GDB Server Remote Payload Execution',
1616
'Description' => %q{
17-
This module attempts to execute an arbitrary payload on a gdbserver service.
17+
This module attempts to execute an arbitrary payload on a loose gdbserver service.
1818
},
1919
'Author' => [ 'joev' ],
2020
'Targets' => [
2121
[ 'x86 (32-bit)', { 'Arch' => ARCH_X86 } ],
2222
[ 'x86_64 (64-bit)', { 'Arch' => ARCH_X86_64 } ]
2323
],
24+
'References' =>
25+
[
26+
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3691']
27+
],
28+
'DisclosureDate' => 'Aug 24 2014',
2429
'Platform' => %w(linux unix osx),
2530
'DefaultTarget' => 0,
2631
'DefaultOptions' => {

0 commit comments

Comments
 (0)