Importing two new wireless DoS modules, setting svn:keywords flags where needed.

git-svn-id: file:///home/svn/framework3/trunk@5482 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2008-04-21 05:27:06 +00:00
parent c5a910525c
commit 82330fff7e
32 changed files with 41 additions and 41 deletions

View File

@ -1,5 +1,5 @@
##
# $Id: maxdb_cons_exec.rb 5282 2008-01-06 22:02:01Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: socks_unc.rb 5069 2007-08-08 02:46:31Z hdm $
# $Id$
##
##
@ -23,7 +23,7 @@ class Auxiliary::Server::Capture::Ftp < Msf::Auxiliary
def initialize
super(
'Name' => 'Authentication Capture: FTP',
'Version' => '$Revision: 5069 $',
'Version' => '$Revision$',
'Description' => %q{
This module provides a fake FTP service that
is designed to capture authentication credentials.

View File

@ -1,5 +1,5 @@
##
# $Id: socks_unc.rb 5069 2007-08-08 02:46:31Z hdm $
# $Id$
##
##
@ -23,7 +23,7 @@ class Auxiliary::Server::Capture::HTTP < Msf::Auxiliary
def initialize
super(
'Name' => 'Authentication Capture: HTTP',
'Version' => '$Revision: 5069 $',
'Version' => '$Revision$',
'Description' => %q{
This module provides a fake HTTP service that
is designed to capture authentication credentials.

View File

@ -1,5 +1,5 @@
##
# $Id: socks_unc.rb 5069 2007-08-08 02:46:31Z hdm $
# $Id$
##
##
@ -23,7 +23,7 @@ class Auxiliary::Server::Capture::Imap < Msf::Auxiliary
def initialize
super(
'Name' => 'Authentication Capture: IMAP',
'Version' => '$Revision: 5069 $',
'Version' => '$Revision$',
'Description' => %q{
This module provides a fake IMAP service that
is designed to capture authentication credentials.

View File

@ -1,5 +1,5 @@
##
# $Id: socks_unc.rb 5069 2007-08-08 02:46:31Z hdm $
# $Id$
##
##
@ -23,7 +23,7 @@ class Auxiliary::Server::Capture::Pop3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Authentication Capture: POP3',
'Version' => '$Revision: 5069 $',
'Version' => '$Revision$',
'Description' => %q{
This module provides a fake POP3 service that
is designed to capture authentication credentials.

View File

@ -1,5 +1,5 @@
##
# $Id: smb_sniffer.rb 5241 2007-12-31 03:03:08Z hdm $
# $Id$
##
##
@ -22,7 +22,7 @@ class Auxiliary::Server::Capture::SMBSniffer < Msf::Auxiliary
def initialize
super(
'Name' => 'Authentication Capture: SMB',
'Version' => '$Revision: 5241 $',
'Version' => '$Revision$',
'Description' => %q{
This module provides a SMB service that can be used to
capture the challenge-response password hashes of SMB client

View File

@ -1,5 +1,5 @@
##
# $Id: socks_unc.rb 5069 2007-08-08 02:46:31Z hdm $
# $Id$
##
##
@ -23,7 +23,7 @@ class Auxiliary::Server::Capture::Smtp < Msf::Auxiliary
def initialize
super(
'Name' => 'Authentication Capture: SMTP',
'Version' => '$Revision: 5069 $',
'Version' => '$Revision$',
'Description' => %q{
This module provides a fake SMTP service that
is designed to capture authentication credentials.

View File

@ -1,5 +1,5 @@
##
# $Id: socks_unc.rb 5069 2007-08-08 02:46:31Z hdm $
# $Id$
##
##
@ -23,7 +23,7 @@ class Auxiliary::Server::FakeDNS < Msf::Auxiliary
def initialize
super(
'Name' => 'Fake DNS Service',
'Version' => '$Revision: 5069 $',
'Version' => '$Revision$',
'Description' => %q{
This module provides a DNS service that redirects
all queries to a particular address.

View File

@ -1,5 +1,5 @@
##
# $Id: xtacacsd_report.rb 4419 2007-02-18 00:10:39Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: mysql_yassl.rb 4419 2007-02-18 00:10:39Z hdm $
# $Id$
##
##

View File

@ -22,7 +22,7 @@ class Exploits::Solaris::Sunrpc::YPUpdateDExec < Msf::Exploit::Remote
},
'Author' => [ 'I)ruid <druid@caughq.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 4498 $',
'Version' => '$Revision$',
'References' =>
[
['BID', '1749'],

View File

@ -1,5 +1,5 @@
##
# $Id: ask_shortformat.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: facebook_extractiptc.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: gom_openurl.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: hploadrunner.rb 5100 2007-09-10 01:01:20Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: kazaa_altnet_heap.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: macrovision_downloadandexecute.rb 5100 2007-09-10 01:01:20Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
## $Id: novelliprint_executerequest.rb 4953 2007-05-21 20:51:13Z hdm $
## $Id$
###
###

View File

@ -25,7 +25,7 @@ class Exploits::Windows::Browser::RealPlayer_Console < Msf::Exploit::Remote
},
'License' => MSF_LICENSE,
'Author' => [ 'Elazar Broad <elazarb[at]earthlink.net>' ],
'Version' => '$Revision: 0 $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', 'CVE-2008-1309' ],

View File

@ -1,5 +1,5 @@
##
# $Id: realplayer_import.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: sonicwall_addrouteentry.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -25,7 +25,7 @@ class Exploits::Windows::Browser::Symantec_BackupExec_PVCalendar < Msf::Exploit:
},
'License' => MSF_LICENSE,
'Author' => [ 'Elazar Broad <elazarb[at]earthlink.net>' ],
'Version' => '$Revision: 0 $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', 'CVE-2007-6016' ],

View File

@ -1,5 +1,5 @@
##
# $Id: winamp_ultravox.rb 4419 2007-02-18 00:10:39Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: yahoomessenger_fvcom.rb 4953 2007-05-21 20:51:13Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: badblue_passthru.rb 4741 2007-04-23 05:30:48Z mmiller $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: hp_nnm.rb 4498 2007-03-01 08:21:36Z mmiller $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: ibm_tsm_cad.rb 4498 2007-03-01 08:21:36Z mmiller $
# $Id$
##
##
@ -27,7 +27,7 @@ class Exploits::Windows::Http::Ibm_Tsm_Cad < Msf::Exploit::Remote
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 4498 $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-4880' ],

View File

@ -1,5 +1,5 @@
##
# $Id: saplpd.rb 4498 2007-03-01 08:21:36Z mmiller $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: wincomlpd_admin.rb 4498 2007-03-01 08:21:36Z mmiller $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: apple_quicktime_rtsp_response.rb 4419 2007-02-18 00:10:39Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: ms07_064_sami.rb 4419 2007-02-18 00:10:39Z hdm $
# $Id$
##
##

View File

@ -1,5 +1,5 @@
##
# $Id: mercury_cram_md5.rb 4419 2007-02-18 00:10:39Z hdm $
# $Id$
##
##
@ -27,7 +27,7 @@ class Exploits::Windows::Smtp::Mercury_Cram_Md5 < Msf::Exploit::Remote
may be able to execute arbitrary code.
},
'Author' => [ 'MC' ],
'Version' => '$Revision: 4419 $',
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-4440' ],