Commit 17857b69 by fwkz

Update modules metadata.

parent 6fc8d05c
......@@ -23,9 +23,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'FTP Bruteforce',
'authors': [
'description': 'Module performs bruteforce attack against FTP service.'
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -22,9 +22,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'FTP Default Creds',
'authors': [
'description': 'Module perform dictionary attack with default credentials against FTP service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -23,9 +23,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'HTTP Basic Bruteforce',
'authors': [
'description': 'Module performs bruteforce attack against HTTP Basic Auth service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -22,9 +22,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'HTTP Basic Default Creds',
'authors': [
'description': 'Module perform dictionary attack with default credentials against HTTP Basic Auth service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -24,9 +24,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'HTTP Form Bruteforce',
'authors': [
'description': 'Module performs bruteforce attack against HTTP form service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -23,9 +23,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'HTTP Form Default Creds',
'authors': [
'description': 'Module performs dictionary attack with default credentials against HTTP form service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -21,7 +21,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'SNMP Bruteforce',
'authors': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
'description': 'Module performs bruteforce attack against SNMP service. '
'If valid community string is found, it is displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -23,7 +23,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'SSH Bruteforce',
'authors': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
'description': 'Module performs bruteforce attack against SSH service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -22,9 +22,14 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'SSH Default Creds',
'authors': [
'description': 'Module perform dictionary attack with default credentials against SSH service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -22,7 +22,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'Telnet Bruteforce',
'authors': 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
'description': 'Module performs bruteforce attack against Telnet service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -21,9 +21,13 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'Telnet Default Creds',
'authors': [
'description': 'Module perform dictionary attack with default credentials against Telnet service. '
'If valid credentials are found, they are displayed to the user.',
'authors': (
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
]
),
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
......@@ -20,6 +20,8 @@ class Exploit(exploits.Exploit):
'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
],
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address e.g. 192.168.1.1') # target address
......
......@@ -20,6 +20,8 @@ class Exploit(exploits.Exploit):
'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
],
'references': '',
'devices': 'Multi',
}
target = exploits.Option('', 'Target IP address e.g. 192.168.1.1') # target address
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment