Commit 813f9cdd by Marcin Bury

Fixing creds module metadata.

parent 0fcedbf5
...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit): ...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit):
'name': 'FTP Bruteforce', 'name': 'FTP Bruteforce',
'description': 'Module performs bruteforce attack against FTP service.' 'description': 'Module performs bruteforce attack against FTP service.'
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -24,11 +24,15 @@ class Exploit(exploits.Exploit): ...@@ -24,11 +24,15 @@ class Exploit(exploits.Exploit):
'name': 'FTP Default Creds', 'name': 'FTP Default Creds',
'description': 'Module perform dictionary attack with default credentials against FTP service. ' 'description': 'Module perform dictionary attack with default credentials against FTP service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit): ...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit):
'name': 'HTTP Basic Bruteforce', 'name': 'HTTP Basic Bruteforce',
'description': 'Module performs bruteforce attack against HTTP Basic Auth service. ' 'description': 'Module performs bruteforce attack against HTTP Basic Auth service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -24,11 +24,15 @@ class Exploit(exploits.Exploit): ...@@ -24,11 +24,15 @@ class Exploit(exploits.Exploit):
'name': 'HTTP Basic Default Creds', 'name': 'HTTP Basic Default Creds',
'description': 'Module perform dictionary attack with default credentials against HTTP Basic Auth service. ' 'description': 'Module perform dictionary attack with default credentials against HTTP Basic Auth service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -26,11 +26,15 @@ class Exploit(exploits.Exploit): ...@@ -26,11 +26,15 @@ class Exploit(exploits.Exploit):
'name': 'HTTP Form Bruteforce', 'name': 'HTTP Form Bruteforce',
'description': 'Module performs bruteforce attack against HTTP form service. ' 'description': 'Module performs bruteforce attack against HTTP form service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit): ...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit):
'name': 'HTTP Form Default Creds', 'name': 'HTTP Form Default Creds',
'description': 'Module performs dictionary attack with default credentials against HTTP form service. ' 'description': 'Module performs dictionary attack with default credentials against HTTP form service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -23,11 +23,15 @@ class Exploit(exploits.Exploit): ...@@ -23,11 +23,15 @@ class Exploit(exploits.Exploit):
'name': 'SNMP Bruteforce', 'name': 'SNMP Bruteforce',
'description': 'Module performs bruteforce attack against SNMP service. ' 'description': 'Module performs bruteforce attack against SNMP service. '
'If valid community string is found, it is displayed to the user.', 'If valid community string is found, it is displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit): ...@@ -25,11 +25,15 @@ class Exploit(exploits.Exploit):
'name': 'SSH Bruteforce', 'name': 'SSH Bruteforce',
'description': 'Module performs bruteforce attack against SSH service. ' 'description': 'Module performs bruteforce attack against SSH service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -24,12 +24,15 @@ class Exploit(exploits.Exploit): ...@@ -24,12 +24,15 @@ class Exploit(exploits.Exploit):
'name': 'SSH Default Creds', 'name': 'SSH Default Creds',
'description': 'Module perform dictionary attack with default credentials against SSH service. ' 'description': 'Module perform dictionary attack with default credentials against SSH service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -24,11 +24,15 @@ class Exploit(exploits.Exploit): ...@@ -24,11 +24,15 @@ class Exploit(exploits.Exploit):
'name': 'Telnet Bruteforce', 'name': 'Telnet Bruteforce',
'description': 'Module performs bruteforce attack against Telnet service. ' 'description': 'Module performs bruteforce attack against Telnet service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
...@@ -23,11 +23,15 @@ class Exploit(exploits.Exploit): ...@@ -23,11 +23,15 @@ class Exploit(exploits.Exploit):
'name': 'Telnet Default Creds', 'name': 'Telnet Default Creds',
'description': 'Module perform dictionary attack with default credentials against Telnet service. ' 'description': 'Module perform dictionary attack with default credentials against Telnet service. '
'If valid credentials are found, they are displayed to the user.', 'If valid credentials are found, they are displayed to the user.',
'authors': ( 'authors': [
'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module 'Marcin Bury <marcin.bury[at]reverse-shell.com>' # routersploit module
), ],
'references': '', 'references': [
'devices': 'Multi', '',
],
'devices': [
'Multi',
],
} }
target = exploits.Option('', 'Target IP address or file with target:port (file://)') target = exploits.Option('', 'Target IP address or file with target:port (file://)')
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment