Skip to content

Commit 0f9f8ac

Browse files
committed
Merge pull request #4 from wvu-r7/pr/2848
Clean up formatting
2 parents a8fcf13 + fc616c4 commit 0f9f8ac

File tree

1 file changed

+27
-30
lines changed

1 file changed

+27
-30
lines changed

modules/auxiliary/scanner/smb/ms08_067_check.rb

Lines changed: 27 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -3,43 +3,40 @@
33
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

6-
require 'msf/core'
6+
require "msf/core"
77

8-
class Metasploit3 < Msf::Auxiliary
8+
class Metasploit4 < Msf::Auxiliary
99

1010
include Msf::Exploit::Remote::DCERPC
1111
include Msf::Exploit::Remote::SMB
1212
include Msf::Auxiliary::Scanner
1313
include Msf::Auxiliary::Report
1414

15-
def initialize
16-
super(
17-
'Name' => 'MS08-067 Scanner',
18-
'Description' => 'This module uses the check in ms08_067_netapi to scan a network for the vulnerability.',
19-
'References' =>
20-
[
21-
[ 'CVE', '2008-4250'],
22-
[ 'OSVDB', '49243'],
23-
[ 'MSB', 'MS08-067' ],
24-
# If this vulnerability is found, ms08-67 is exposed as well
25-
[ 'URL', 'http://www.rapid7.com/vulndb/lookup/dcerpc-ms-netapi-netpathcanonicalize-dos']
26-
],
27-
'Author' =>
28-
[
29-
'hdm', # with tons of input/help/testing from the community
30-
'Brett Moore <brett.moore[at]insomniasec.com>',
31-
'frank2 <[email protected]>', # check() detection
32-
'jduck', # XP SP2/SP3 AlwaysOn DEP bypass
33-
'sho-luv', # Cut frank2's check into auxiliary module
34-
'wvu' # Added scan labels cleaned up code
35-
],
36-
'License' => MSF_LICENSE,
37-
'DefaultOptions' => {}
38-
)
39-
register_options(
40-
[
41-
OptString.new('SMBPIPE', [ true, "The pipe name to use (BROWSER, SRVSVC)", 'BROWSER'])
42-
], self.class)
15+
def initialize(info = {})
16+
super(update_info(info,
17+
'Name' => "MS08-067 Scanner",
18+
'Description' => "This module uses the check in ms08_067_netapi to scan for MS08-067.",
19+
'Author' => [
20+
"hdm", # with tons of input/help/testing from the community
21+
"Brett Moore <brett.moore[at]insomniasec.com>",
22+
"frank2 <[email protected]>", # check() detection
23+
"jduck", # XP SP2/SP3 AlwaysOn DEP bypass
24+
"sho-luv", # Original module
25+
"wvu" # Refactor and cleanup
26+
],
27+
'References' => [
28+
["CVE", "2008-4250"],
29+
["OSVDB", "49243"],
30+
["MSB", "MS08-067"],
31+
# If this vulnerability is found, ms08-67 is exposed as well
32+
["URL", "http://www.rapid7.com/vulndb/lookup/dcerpc-ms-netapi-netpathcanonicalize-dos"]
33+
],
34+
'License' => MSF_LICENSE
35+
))
36+
37+
register_options([
38+
OptString.new("SMBPIPE", [true, "The pipe name to use (BROWSER, SRVSVC)", "BROWSER"])
39+
], self.class)
4340
end
4441

4542
def run_host(ip)

0 commit comments

Comments
 (0)