|
3 | 3 | # Current source: https://github.com/rapid7/metasploit-framework |
4 | 4 | ## |
5 | 5 |
|
6 | | -require 'msf/core' |
| 6 | +require "msf/core" |
7 | 7 |
|
8 | | -class Metasploit3 < Msf::Auxiliary |
| 8 | +class Metasploit4 < Msf::Auxiliary |
9 | 9 |
|
10 | 10 | include Msf::Exploit::Remote::DCERPC |
11 | 11 | include Msf::Exploit::Remote::SMB |
12 | 12 | include Msf::Auxiliary::Scanner |
13 | 13 | include Msf::Auxiliary::Report |
14 | 14 |
|
15 | | - def initialize |
16 | | - super( |
17 | | - 'Name' => 'MS08-067 Scanner', |
18 | | - 'Description' => 'This module uses the check in ms08_067_netapi to scan a network for the vulnerability.', |
19 | | - 'References' => |
20 | | - [ |
21 | | - [ 'CVE', '2008-4250'], |
22 | | - [ 'OSVDB', '49243'], |
23 | | - [ 'MSB', 'MS08-067' ], |
24 | | - # If this vulnerability is found, ms08-67 is exposed as well |
25 | | - [ 'URL', 'http://www.rapid7.com/vulndb/lookup/dcerpc-ms-netapi-netpathcanonicalize-dos'] |
26 | | - ], |
27 | | - 'Author' => |
28 | | - [ |
29 | | - 'hdm', # with tons of input/help/testing from the community |
30 | | - 'Brett Moore <brett.moore[at]insomniasec.com>', |
31 | | - 'frank2 <[email protected]>', # check() detection |
32 | | - 'jduck', # XP SP2/SP3 AlwaysOn DEP bypass |
33 | | - 'sho-luv', # Cut frank2's check into auxiliary module |
34 | | - 'wvu' # Added scan labels cleaned up code |
35 | | - ], |
36 | | - 'License' => MSF_LICENSE, |
37 | | - 'DefaultOptions' => {} |
38 | | - ) |
39 | | - register_options( |
40 | | - [ |
41 | | - OptString.new('SMBPIPE', [ true, "The pipe name to use (BROWSER, SRVSVC)", 'BROWSER']) |
42 | | - ], self.class) |
| 15 | + def initialize(info = {}) |
| 16 | + super(update_info(info, |
| 17 | + 'Name' => "MS08-067 Scanner", |
| 18 | + 'Description' => "This module uses the check in ms08_067_netapi to scan for MS08-067.", |
| 19 | + 'Author' => [ |
| 20 | + "hdm", # with tons of input/help/testing from the community |
| 21 | + "Brett Moore <brett.moore[at]insomniasec.com>", |
| 22 | + "frank2 <[email protected]>", # check() detection |
| 23 | + "jduck", # XP SP2/SP3 AlwaysOn DEP bypass |
| 24 | + "sho-luv", # Original module |
| 25 | + "wvu" # Refactor and cleanup |
| 26 | + ], |
| 27 | + 'References' => [ |
| 28 | + ["CVE", "2008-4250"], |
| 29 | + ["OSVDB", "49243"], |
| 30 | + ["MSB", "MS08-067"], |
| 31 | + # If this vulnerability is found, ms08-67 is exposed as well |
| 32 | + ["URL", "http://www.rapid7.com/vulndb/lookup/dcerpc-ms-netapi-netpathcanonicalize-dos"] |
| 33 | + ], |
| 34 | + 'License' => MSF_LICENSE |
| 35 | + )) |
| 36 | + |
| 37 | + register_options([ |
| 38 | + OptString.new("SMBPIPE", [true, "The pipe name to use (BROWSER, SRVSVC)", "BROWSER"]) |
| 39 | + ], self.class) |
43 | 40 | end |
44 | 41 |
|
45 | 42 | def run_host(ip) |
|
0 commit comments