clean up some oracle titles
git-svn-id: file:///home/svn/framework3/trunk@11128 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
e9faf75503
commit
8f55c83ed0
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'ORACLE SID Brute Forcer',
|
||||
'Name' => 'Oracle TNS Listener SID Brute Forcer',
|
||||
'Description' => %q{
|
||||
This module simply attempts to discover the protected SID.
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'TNSLsnr Command Issuer',
|
||||
'Name' => 'Oracle TNS Listener Command Issuer',
|
||||
'Description' => %q{
|
||||
This module allows for the sending of arbitrary TNS commands in order
|
||||
to gather information.
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle SID Enumeration',
|
||||
'Name' => 'Oracle TNS Listener SID Enumeration',
|
||||
'Description' => %q{
|
||||
This module simply queries the TNS listner for the Oracle SID.
|
||||
With Oracle 9.2.0.8 and above the listener will be protected and
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle tnslsnr Service Version Query',
|
||||
'Name' => 'Oracle TNS Listener Service Version Query',
|
||||
'Description' => %q{
|
||||
This module simply queries the tnslsnr service for the Oracle build.
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle TNS Listener AUTH_SESSKEY Buffer Overflow',
|
||||
'Name' => 'Oracle 10gR2 TNS Listener AUTH_SESSKEY Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Oracle. When
|
||||
sending a specially crafted packet containing a long AUTH_SESSKEY value
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle TNS Listener SERVICE_NAME Buffer Overflow',
|
||||
'Name' => 'Oracle 8i TNS Listener SERVICE_NAME Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Oracle. When
|
||||
sending a specially crafted packet containing a long SERVICE_NAME
|
||||
|
|
Loading…
Reference in New Issue