Land #18861, Removes SessionType values from modules with OptionalSession mixin

This commit is contained in:
dwelch-r7 2024-02-19 10:57:41 +00:00 committed by GitHub
commit 0108f1f214
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
18 changed files with 13 additions and 31 deletions

View File

@ -18,8 +18,7 @@ class MetasploitModule < Msf::Auxiliary
supplied.
},
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>' ],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MSSQL],
'License' => MSF_LICENSE
))
end

View File

@ -18,8 +18,7 @@ class MetasploitModule < Msf::Auxiliary
},
'Author' => [ 'nullbind <scott.sutherland[at]netspi.com>'],
'License' => MSF_LICENSE,
'References' => [[ 'URL','http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx']],
'SessionTypes' => %w[MSSQL]
'References' => [[ 'URL','http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx']]
))
end

View File

@ -28,8 +28,7 @@ class MetasploitModule < Msf::Auxiliary
'todb' # Help on GitHub
],
'License' => MSF_LICENSE,
'References' => [[ 'URL', 'http://www.netspi.com/blog/author/ssutherland/' ]],
'SessionTypes' => %w[MSSQL],
'References' => [[ 'URL', 'http://www.netspi.com/blog/author/ssutherland/' ]]
))
register_options(

View File

@ -30,8 +30,7 @@ class MetasploitModule < Msf::Auxiliary
'References' =>
[
[ 'URL', 'http://www.digininja.org/metasploit/mssql_idf.php' ],
],
'SessionTypes' => %w[MSSQL]
]
))
register_options(

View File

@ -20,8 +20,7 @@ class MetasploitModule < Msf::Auxiliary
[
[ 'URL', 'http://www.attackresearch.com' ],
[ 'URL', 'http://msdn.microsoft.com/en-us/library/cc448435(PROT.10).aspx'],
],
'SessionTypes' => %w[MSSQL],
]
))
register_options(

View File

@ -16,8 +16,7 @@ class MetasploitModule < Msf::Auxiliary
the appropriate credentials.
},
'Author' => [ 'j0hn__f : <jf[at]tinternet.org.uk>' ],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MSSQL]
'License' => MSF_LICENSE
))
register_options(

View File

@ -17,7 +17,6 @@ class MetasploitModule < Msf::Auxiliary
},
'Author' => [ 'Carlos Perez <carlos_perez[at]darkoperator.com>' ],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MySQL],
'References' =>
[
[ 'URL', 'https://cisecurity.org/benchmarks.html' ]

View File

@ -19,8 +19,7 @@ class MetasploitModule < Msf::Auxiliary
table names, which can be used to seed the wordlist.
},
'Author' => ['theLightCosine'],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MSSQL],
'License' => MSF_LICENSE
)
end

View File

@ -21,8 +21,7 @@ class MetasploitModule < Msf::Auxiliary
as loot for easy reading.
},
'Author' => ['theLightCosine'],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MSSQL],
'License' => MSF_LICENSE
)
register_options([

View File

@ -23,8 +23,7 @@ class MetasploitModule < Msf::Auxiliary
[ 'URL', 'http://pauldotcom.com/2013/01/mysql-file-system-enumeration.html' ],
[ 'URL', 'http://www.digininja.org/projects/mysql_file_enum.php' ]
],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MySQL]
'License' => MSF_LICENSE
)
register_options([

View File

@ -17,8 +17,7 @@ class MetasploitModule < Msf::Auxiliary
hashes from a MySQL server and stores them for later cracking.
),
'Author' => ['theLightCosine'],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MySQL]
'License' => MSF_LICENSE
)
end

View File

@ -19,8 +19,7 @@ class MetasploitModule < Msf::Auxiliary
MySQL DB server.
},
'Author' => ['theLightCosine'],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MySQL]
'License' => MSF_LICENSE
)
register_options([

View File

@ -21,8 +21,7 @@ class MetasploitModule < Msf::Auxiliary
'References' => [
[ 'URL', 'https://dev.mysql.com/doc/refman/5.7/en/select-into.html' ]
],
'License' => MSF_LICENSE,
'SessionTypes' => %w[MySQL]
'License' => MSF_LICENSE
)
register_options([

View File

@ -17,8 +17,7 @@ class MetasploitModule < Msf::Auxiliary
hashes from a Postgres server and stores them for later cracking.
},
'Author' => ['theLightCosine'],
'License' => MSF_LICENSE,
'SessionTypes' => %w[PostgreSQL]
'License' => MSF_LICENSE
)
deregister_options('SQL', 'RETURN_ROWSET', 'VERBOSE')

View File

@ -38,7 +38,6 @@ class MetasploitModule < Msf::Exploit::Remote
[ 'URL', 'http://bernardodamele.blogspot.com/2009/01/command-execution-with-mysql-udf.html' ]
],
'Platform' => ['win', 'linux'],
'SessionTypes' => %w[MySQL],
'Targets' =>
[
[ 'Windows', {'CmdStagerFlavor' => 'vbs'} ], # Confirmed on MySQL 4.1.22, 5.5.9, and 5.1.56 (64bit)

View File

@ -54,7 +54,6 @@ class MetasploitModule < Msf::Exploit::Remote
],
'Platform' => 'win',
'Arch' => [ ARCH_X86, ARCH_X64 ],
'SessionTypes' => %w[MSSQL],
'Targets' =>
[
[ 'Automatic', { } ],

View File

@ -35,7 +35,6 @@ class MetasploitModule < Msf::Exploit::Remote
['URL', 'https://seclists.org/fulldisclosure/2012/Dec/13']
],
'Platform' => 'win',
'SessionTypes' => %w[MySQL],
'Targets' =>
[
[ 'MySQL on Windows prior to Vista', { } ]

View File

@ -39,7 +39,6 @@ class MetasploitModule < Msf::Exploit::Remote
['URL', 'https://seclists.org/fulldisclosure/2012/Dec/13']
],
'Platform' => 'win',
'SessionTypes' => %w[MySQL],
'Targets' =>
[
[ 'MySQL on Windows', { } ]