Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/atg/atg_client.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Scanner

def initialize
def initialize(info = {})
super(
'Name' => 'Veeder-Root Automatic Tank Gauge (ATG) Administrative Client',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/dns/dyn_dns_update.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@

class MetasploitModule < Msf::Auxiliary

def initialize
def initialize(info = {})
super(
'Name' => 'DNS Server Dynamic Update Record Injection',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient

def initialize
def initialize(info = {})
super(
'Name' => 'Red Hat CloudForms Management Engine 5.1 miq_policy/explorer SQL Injection',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/contentkeeper_fileaccess.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Scanner

def initialize
def initialize(info = {})
super(
'Name' => 'ContentKeeper Web Appliance mimencode File Access',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report

def initialize
def initialize(info = {})
super(
'Name' => 'D-Link DIR 645 Password Extractor',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report

def initialize
def initialize(info = {})
super(
'Name' => 'D-Link DSL 320B Password Extractor',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient

def initialize
def initialize(info = {})
super(
'Name' => 'Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Scanner
include Msf::Exploit::Remote::HttpClient

def initialize
def initialize(info = {})
super(
'Name' => 'GitLab Password Reset Account Takeover',
'Description' => 'This module exploits an account-take-over vulnerability that allows users
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient

def initialize
def initialize(info = {})
super(
'Name' => 'Iomega StorCenter Pro NAS Web Authentication Bypass',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/jboss_bshdeployer.rb
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HTTP::JBoss

def initialize
def initialize(info = {})
super(
'Name' => 'JBoss JMX Console Beanshell Deployer WAR Upload and Deployment',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HTTP::JBoss

def initialize
def initialize(info = {})
super(
'Name' => 'JBoss JMX Console DeploymentFileRepository WAR Upload and Deployment',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/katello_satellite_priv_esc.rb
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient

def initialize
def initialize(info = {})
super(
'Name' => 'Katello (Red Hat Satellite) users/update_roles Missing Authorization',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report

def initialize
def initialize(info = {})
super(
'Name' => 'Netgear Unauthenticated SOAP Password Extractor',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/tomcat_administration.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::WmapScanServer
include Msf::Auxiliary::Scanner

def initialize
def initialize(info = {})
super(
'Name' => 'Tomcat Administration Tool Default Access',
'Description' => 'Detect the Tomcat administration interface. The administration interface is included in versions 5.5 and lower.
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/tomcat_utf8_traversal.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::WmapScanServer
include Msf::Auxiliary::Scanner

def initialize
def initialize(info = {})
super(
'Name' => 'Tomcat UTF-8 Directory Traversal Vulnerability',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Scanner

def initialize
def initialize(info = {})
super(
'Name' => 'TrendMicro Data Loss Prevention 5.5 Directory Traversal',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/typo3_sa_2009_001.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report

def initialize
def initialize(info = {})
super(
'Name' => 'TYPO3 sa-2009-001 Weak Encryption Key File Disclosure',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/http/typo3_sa_2010_020.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report

def initialize
def initialize(info = {})
super(
'Name' => 'TYPO3 sa-2010-020 Remote File Disclosure',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report

def initialize
def initialize(info = {})
super(
'Name' => 'TYPO3 Winstaller Default Encryption Keys',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::HttpClient

def initialize
def initialize(info = {})
super(
'Name' => 'ZyXEL GS1510-16 Password Extractor',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/natpmp/natpmp_map.rb
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::NATPMP
include Rex::Proto::NATPMP

def initialize
def initialize(info = {})
super(
'Name' => 'NAT-PMP Port Mapper',
'Description' => 'Map (forward) TCP and UDP ports on NAT devices using NAT-PMP',
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/netbios/netbios_spoof.rb
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Udp

def initialize
def initialize(info = {})
super(
'Name' => 'NetBIOS Response Brute Force Spoof (Direct)',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/networking/cisco_asa_extrabacon.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Deprecated
moved_from 'auxiliary/admin/cisco/cisco_asa_extrabacon'

def initialize
def initialize(info = {})
super(
'Name' => 'Cisco ASA Authentication Bypass (EXTRABACON)',
'Description' => %q{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ def initialize(info = {})
KEY = 's91zEQmb305F!90a'.freeze

class AESCipher
def initialize
def initialize(info = {})
# Cisco's hardcoded key
@bs = 16
end
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/officescan/tmlisten_traversal.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Scanner

def initialize
def initialize(info = {})
super(
'Name' => 'TrendMicro OfficeScanNT Listener Traversal Arbitrary File Access',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/sap/sap_mgmt_con_osexec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner

def initialize
def initialize(info = {})
super(
'Name' => 'SAP Management Console OSExecute',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/check_dir_file.rb
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ class MetasploitModule < Msf::Auxiliary
XCEPT = Rex::Proto::SMB::Exceptions
CONST = Rex::Proto::SMB::Constants

def initialize
def initialize(info = {})
super(
'Name' => 'SMB Scanner Check File/Directory Utility',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/delete_file.rb
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ class MetasploitModule < Msf::Auxiliary
XCEPT = Rex::Proto::SMB::Exceptions
CONST = Rex::Proto::SMB::Constants

def initialize
def initialize(info = {})
super(
'Name' => 'SMB File Delete Utility',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/download_file.rb
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Scanner
include Msf::OptionalSession::SMB

def initialize
def initialize(info = {})
super(
'Name' => 'SMB File Download Utility',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/list_directory.rb
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
XCEPT = Rex::Proto::SMB::Exceptions
CONST = Rex::Proto::SMB::Constants

def initialize
def initialize(info = {})
super(
'Name' => 'SMB Directory Listing Utility',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/samba_symlink_traversal.rb
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
XCEPT = Rex::Proto::SMB::Exceptions
CONST = Rex::Proto::SMB::Constants

def initialize
def initialize(info = {})
super(
'Name' => 'Samba Symlink Directory Traversal',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/upload_file.rb
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Scanner
include Msf::OptionalSession::SMB

def initialize
def initialize(info = {})
super(
'Name' => 'SMB File Upload Utility',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::SunRPC

def initialize
def initialize(info = {})
super(
'Name' => 'Solaris KCMS + TTDB Arbitrary File Read',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/tftp/tftp_transfer_util.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ class MetasploitModule < Msf::Auxiliary
include Rex::Proto::TFTP
include Msf::Auxiliary::Report

def initialize
def initialize(info = {})
super(
'Name' => 'TFTP File Transfer Utility',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/upnp/soap_portmapping.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient

def initialize
def initialize(info = {})
super(
'Name' => 'UPnP IGD SOAP Port Mapping Utility',
'Description' => %q{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/vmware/poweroff_vm.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::VIMSoap

def initialize
def initialize(info = {})
super(
'Name' => 'VMWare Power Off Virtual Machine',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/vmware/poweron_vm.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::VIMSoap

def initialize
def initialize(info = {})
super(
'Name' => 'VMWare Power On Virtual Machine',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/vmware/tag_vm.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::VIMSoap

def initialize
def initialize(info = {})
super(
'Name' => 'VMWare Tag Virtual Machine',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/vmware/terminate_esx_sessions.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::Report
include Msf::Exploit::Remote::VIMSoap

def initialize
def initialize(info = {})
super(
'Name' => 'VMWare Terminate ESX Login Sessions',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/analyze/apply_pot.rb
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::PasswordCracker

def initialize
def initialize(info = {})
super(
'Name' => 'Apply Pot File To Hashes',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/analyze/crack_aix.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Deprecated
moved_from 'auxiliary/analyze/jtr_aix'

def initialize
def initialize(info = {})
super(
'Name' => 'Password Cracker: AIX',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/analyze/crack_databases.rb
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ class MetasploitModule < Msf::Auxiliary
moved_from 'auxiliary/analyze/jtr_oracle_fast'
moved_from 'auxiliary/analyze/jtr_postgres_fast'

def initialize
def initialize(info = {})
super(
'Name' => 'Password Cracker: Databases',
'Description' => %(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/analyze/crack_linux.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Deprecated
moved_from 'auxiliary/analyze/jtr_linux'

def initialize
def initialize(info = {})
super(
'Name' => 'Password Cracker: Linux',
'Description' => %{
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/analyze/crack_mobile.rb
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
class MetasploitModule < Msf::Auxiliary
include Msf::Auxiliary::PasswordCracker

def initialize
def initialize(info = {})
super(
'Name' => 'Password Cracker: Mobile',
'Description' => %{
Expand Down
Loading
Loading