diff --git a/modules/auxiliary/admin/mssql/mssql_enum.rb b/modules/auxiliary/admin/mssql/mssql_enum.rb index ba71ee1a4a..ef349fdaa0 100644 --- a/modules/auxiliary/admin/mssql/mssql_enum.rb +++ b/modules/auxiliary/admin/mssql/mssql_enum.rb @@ -18,8 +18,7 @@ class MetasploitModule < Msf::Auxiliary supplied. }, 'Author' => [ 'Carlos Perez ' ], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MSSQL], + 'License' => MSF_LICENSE )) end diff --git a/modules/auxiliary/admin/mssql/mssql_escalate_dbowner.rb b/modules/auxiliary/admin/mssql/mssql_escalate_dbowner.rb index 1ec1b8bc31..82ef51712a 100644 --- a/modules/auxiliary/admin/mssql/mssql_escalate_dbowner.rb +++ b/modules/auxiliary/admin/mssql/mssql_escalate_dbowner.rb @@ -18,8 +18,7 @@ class MetasploitModule < Msf::Auxiliary }, 'Author' => [ 'nullbind '], 'License' => MSF_LICENSE, - 'References' => [[ 'URL','http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx']], - 'SessionTypes' => %w[MSSQL] + 'References' => [[ 'URL','http://technet.microsoft.com/en-us/library/ms188676(v=sql.105).aspx']] )) end diff --git a/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb b/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb index c78b08320f..1e742fd36f 100644 --- a/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb +++ b/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb @@ -28,8 +28,7 @@ class MetasploitModule < Msf::Auxiliary 'todb' # Help on GitHub ], 'License' => MSF_LICENSE, - 'References' => [[ 'URL', 'http://www.netspi.com/blog/author/ssutherland/' ]], - 'SessionTypes' => %w[MSSQL], + 'References' => [[ 'URL', 'http://www.netspi.com/blog/author/ssutherland/' ]] )) register_options( diff --git a/modules/auxiliary/admin/mssql/mssql_idf.rb b/modules/auxiliary/admin/mssql/mssql_idf.rb index 44f6c51d1e..f2fb6d03c0 100644 --- a/modules/auxiliary/admin/mssql/mssql_idf.rb +++ b/modules/auxiliary/admin/mssql/mssql_idf.rb @@ -30,8 +30,7 @@ class MetasploitModule < Msf::Auxiliary 'References' => [ [ 'URL', 'http://www.digininja.org/metasploit/mssql_idf.php' ], - ], - 'SessionTypes' => %w[MSSQL] + ] )) register_options( diff --git a/modules/auxiliary/admin/mssql/mssql_sql.rb b/modules/auxiliary/admin/mssql/mssql_sql.rb index fc94c82e52..ba68d971c8 100644 --- a/modules/auxiliary/admin/mssql/mssql_sql.rb +++ b/modules/auxiliary/admin/mssql/mssql_sql.rb @@ -20,8 +20,7 @@ class MetasploitModule < Msf::Auxiliary [ [ 'URL', 'http://www.attackresearch.com' ], [ 'URL', 'http://msdn.microsoft.com/en-us/library/cc448435(PROT.10).aspx'], - ], - 'SessionTypes' => %w[MSSQL], + ] )) register_options( diff --git a/modules/auxiliary/admin/mssql/mssql_sql_file.rb b/modules/auxiliary/admin/mssql/mssql_sql_file.rb index 56f363c546..13e7a3581a 100644 --- a/modules/auxiliary/admin/mssql/mssql_sql_file.rb +++ b/modules/auxiliary/admin/mssql/mssql_sql_file.rb @@ -16,8 +16,7 @@ class MetasploitModule < Msf::Auxiliary the appropriate credentials. }, 'Author' => [ 'j0hn__f : ' ], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MSSQL] + 'License' => MSF_LICENSE )) register_options( diff --git a/modules/auxiliary/admin/mysql/mysql_enum.rb b/modules/auxiliary/admin/mysql/mysql_enum.rb index 3d3f1e36fa..810a3263c7 100644 --- a/modules/auxiliary/admin/mysql/mysql_enum.rb +++ b/modules/auxiliary/admin/mysql/mysql_enum.rb @@ -17,7 +17,6 @@ class MetasploitModule < Msf::Auxiliary }, 'Author' => [ 'Carlos Perez ' ], 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MySQL], 'References' => [ [ 'URL', 'https://cisecurity.org/benchmarks.html' ] diff --git a/modules/auxiliary/scanner/mssql/mssql_hashdump.rb b/modules/auxiliary/scanner/mssql/mssql_hashdump.rb index f7eb1d2451..d7ec97d346 100644 --- a/modules/auxiliary/scanner/mssql/mssql_hashdump.rb +++ b/modules/auxiliary/scanner/mssql/mssql_hashdump.rb @@ -19,8 +19,7 @@ class MetasploitModule < Msf::Auxiliary table names, which can be used to seed the wordlist. }, 'Author' => ['theLightCosine'], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MSSQL], + 'License' => MSF_LICENSE ) end diff --git a/modules/auxiliary/scanner/mssql/mssql_schemadump.rb b/modules/auxiliary/scanner/mssql/mssql_schemadump.rb index b4d9b9c18c..5f23f6632a 100644 --- a/modules/auxiliary/scanner/mssql/mssql_schemadump.rb +++ b/modules/auxiliary/scanner/mssql/mssql_schemadump.rb @@ -21,8 +21,7 @@ class MetasploitModule < Msf::Auxiliary as loot for easy reading. }, 'Author' => ['theLightCosine'], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MSSQL], + 'License' => MSF_LICENSE ) register_options([ diff --git a/modules/auxiliary/scanner/mysql/mysql_file_enum.rb b/modules/auxiliary/scanner/mysql/mysql_file_enum.rb index e45ba69e06..f4fb52d815 100644 --- a/modules/auxiliary/scanner/mysql/mysql_file_enum.rb +++ b/modules/auxiliary/scanner/mysql/mysql_file_enum.rb @@ -23,8 +23,7 @@ class MetasploitModule < Msf::Auxiliary [ 'URL', 'http://pauldotcom.com/2013/01/mysql-file-system-enumeration.html' ], [ 'URL', 'http://www.digininja.org/projects/mysql_file_enum.php' ] ], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MySQL] + 'License' => MSF_LICENSE ) register_options([ diff --git a/modules/auxiliary/scanner/mysql/mysql_hashdump.rb b/modules/auxiliary/scanner/mysql/mysql_hashdump.rb index a68413977c..4086c791b9 100644 --- a/modules/auxiliary/scanner/mysql/mysql_hashdump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_hashdump.rb @@ -17,8 +17,7 @@ class MetasploitModule < Msf::Auxiliary hashes from a MySQL server and stores them for later cracking. ), 'Author' => ['theLightCosine'], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MySQL] + 'License' => MSF_LICENSE ) end diff --git a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb index e27c32e981..beae3f6eec 100644 --- a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb @@ -19,8 +19,7 @@ class MetasploitModule < Msf::Auxiliary MySQL DB server. }, 'Author' => ['theLightCosine'], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MySQL] + 'License' => MSF_LICENSE ) register_options([ diff --git a/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb b/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb index db504d104e..9ad9049716 100644 --- a/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb +++ b/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb @@ -21,8 +21,7 @@ class MetasploitModule < Msf::Auxiliary 'References' => [ [ 'URL', 'https://dev.mysql.com/doc/refman/5.7/en/select-into.html' ] ], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[MySQL] + 'License' => MSF_LICENSE ) register_options([ diff --git a/modules/auxiliary/scanner/postgres/postgres_hashdump.rb b/modules/auxiliary/scanner/postgres/postgres_hashdump.rb index b6e6047fb2..aab11e13a6 100644 --- a/modules/auxiliary/scanner/postgres/postgres_hashdump.rb +++ b/modules/auxiliary/scanner/postgres/postgres_hashdump.rb @@ -17,8 +17,7 @@ class MetasploitModule < Msf::Auxiliary hashes from a Postgres server and stores them for later cracking. }, 'Author' => ['theLightCosine'], - 'License' => MSF_LICENSE, - 'SessionTypes' => %w[PostgreSQL] + 'License' => MSF_LICENSE ) deregister_options('SQL', 'RETURN_ROWSET', 'VERBOSE') diff --git a/modules/exploits/multi/mysql/mysql_udf_payload.rb b/modules/exploits/multi/mysql/mysql_udf_payload.rb index eab8b1b8b4..842262f55c 100644 --- a/modules/exploits/multi/mysql/mysql_udf_payload.rb +++ b/modules/exploits/multi/mysql/mysql_udf_payload.rb @@ -38,7 +38,6 @@ class MetasploitModule < Msf::Exploit::Remote [ 'URL', 'http://bernardodamele.blogspot.com/2009/01/command-execution-with-mysql-udf.html' ] ], 'Platform' => ['win', 'linux'], - 'SessionTypes' => %w[MySQL], 'Targets' => [ [ 'Windows', {'CmdStagerFlavor' => 'vbs'} ], # Confirmed on MySQL 4.1.22, 5.5.9, and 5.1.56 (64bit) diff --git a/modules/exploits/windows/mssql/mssql_payload.rb b/modules/exploits/windows/mssql/mssql_payload.rb index f2bbdd0be8..bac9aadad6 100644 --- a/modules/exploits/windows/mssql/mssql_payload.rb +++ b/modules/exploits/windows/mssql/mssql_payload.rb @@ -54,7 +54,6 @@ class MetasploitModule < Msf::Exploit::Remote ], 'Platform' => 'win', 'Arch' => [ ARCH_X86, ARCH_X64 ], - 'SessionTypes' => %w[MSSQL], 'Targets' => [ [ 'Automatic', { } ], diff --git a/modules/exploits/windows/mysql/mysql_mof.rb b/modules/exploits/windows/mysql/mysql_mof.rb index c5184dbd32..1b79c2df7c 100644 --- a/modules/exploits/windows/mysql/mysql_mof.rb +++ b/modules/exploits/windows/mysql/mysql_mof.rb @@ -35,7 +35,6 @@ class MetasploitModule < Msf::Exploit::Remote ['URL', 'https://seclists.org/fulldisclosure/2012/Dec/13'] ], 'Platform' => 'win', - 'SessionTypes' => %w[MySQL], 'Targets' => [ [ 'MySQL on Windows prior to Vista', { } ] diff --git a/modules/exploits/windows/mysql/mysql_start_up.rb b/modules/exploits/windows/mysql/mysql_start_up.rb index 27e27c5b38..b0a14715fb 100644 --- a/modules/exploits/windows/mysql/mysql_start_up.rb +++ b/modules/exploits/windows/mysql/mysql_start_up.rb @@ -39,7 +39,6 @@ class MetasploitModule < Msf::Exploit::Remote ['URL', 'https://seclists.org/fulldisclosure/2012/Dec/13'] ], 'Platform' => 'win', - 'SessionTypes' => %w[MySQL], 'Targets' => [ [ 'MySQL on Windows', { } ]