From 0e3053c0fdc2a948b72d4d88f22b47aafd4aaaad Mon Sep 17 00:00:00 2001 From: HD Moore Date: Sun, 10 Dec 2006 02:21:25 +0000 Subject: [PATCH] Start of the compatibility docs git-svn-id: file:///home/svn/framework3/trunk@4168 4d416f70-5f16-0410-b530-b9f4589650da --- documentation/metasploit2/README | 5 + documentation/metasploit2/exploits.txt | 163 +++++++++++++++++++++++++ 2 files changed, 168 insertions(+) create mode 100644 documentation/metasploit2/README create mode 100644 documentation/metasploit2/exploits.txt diff --git a/documentation/metasploit2/README b/documentation/metasploit2/README new file mode 100644 index 0000000000..49719e7f22 --- /dev/null +++ b/documentation/metasploit2/README @@ -0,0 +1,5 @@ +This directory contains 2.7 -> 3.0 compatibility information. + + +Exploit Modules: exploits.txt +Payload Modules: payloads.txt diff --git a/documentation/metasploit2/exploits.txt b/documentation/metasploit2/exploits.txt new file mode 100644 index 0000000000..0412b50b3d --- /dev/null +++ b/documentation/metasploit2/exploits.txt @@ -0,0 +1,163 @@ +Unfinished modules +================== + + arkeia_agent_access + awstats_configdir_exec + badblue_ext_overflow + bakbone_netvault_heap + barracuda_img_exec + blackice_pam_icq + bomberclone_overflow_win32 + cacti_graphimage_exec + calicclnt_getconfig + calicserv_getconfig + exchange2000_xexch50 + freeftpd_key_exchange + gnu_mailutils_imap4d + google_proxystylesheet_exec + hpux_ftpd_preauth_list + ie_createobject + ie_createtextrange + ie_iscomponentinstalled + iis_source_dumper + lyris_attachment_mssql + mailenable_auth_header + mcafee_epolicy_source + mercantec_softcart + mercur_imap_select_overflow + ms05_030_nntp + openview_connectednodes_exec + openview_omniback + pajax_remote_exec + php_wordpress_lastpost + phpbb_highlight + phpnuke_search_module + poptop_negative_read + privatewire_gateway_win32 + putty_ssh + realvnc_41_bypass + realvnc_client + samba_trans2open + sambar6_search_results + seattlelab_mail_55 + securecrt_ssh1 + smb_sniffer + solaris_kcms_readfile + solaris_snmpxdmid + sphpblog_file_upload + squid_ntlm_authenticate + svnserve_date + sybase_easerver + sygate_policy_manager + ultravnc_client + uow_imap4_copy + uow_imap4_lsub + warftpd_165_pass + wmailserver_smtp + wzdftpd_sitem + + +Completed modules +================= + + afp_loginext exploit/osx/afp/loginext + aim_goaway exploit/windows/browser/aim_goaway + altn_webadmin exploit/windows/http/altn_webadmin + apache_chunked_win32 exploit/windows/http/apache_chunked + arkeia_type77_macos exploit/osx/arkeia/type77 + arkeia_type77_win32 exploit/windows/arkeia/type77 + backupexec_agent exploit/windows/backupexec/remote_agent + backupexec_dump auxiliary/admin/backupexec/dump + backupexec_ns exploit/windows/backupexec/name_service + backupexec_registry auxiliary/admin/backupexec/registry + bluecoat_winproxy exploit/windows/proxy/bluecoat_winproxy_host + cabrightstor_disco exploit/windows/brightstor/discovery_udp + cabrightstor_disco_servicepc exploit/windows/brightstor/discovery_tcp + cabrightstor_sqlagent exploit/windows/brightstor/sql_agent + cabrightstor_uniagent exploit/windows/brightstor/universal_agent + cacam_logsecurity_win32 exploit/windows/unicenter/cam_log_security + cesarftp_mkd exploit/windows/ftp/cesarftp_mkd + distcc_exec exploit/unix/misc/distcc_exec + edirectory_imonitor exploit/windows/http/edirectory_imonitor + edirectory_imonitor2 exploit/windows/http/edirectory_host + eiq_license exploit/windows/misc/eiqnetworks_esa + eudora_imap exploit/windows/imap/eudora_list + firefox_queryinterface_linux exploit/multi/browser/firefox_queryinterface + firefox_queryinterface_osx exploit/multi/browser/firefox_queryinterface + freeftpd_user exploit/windows/ftp/freeftpd_user + freesshd_key_exchange exploit/windows/ssh/freesshd_key_exchange + futuresoft_tftpd exploit/windows/tftp/futuresoft_transfermode + globalscapeftp_user_input exploit/windows/ftp/globalscapeftp_input + hpux_lpd_exec exploit/hpux/lpd/cleanup_exec + ia_webmail exploit/windows/http/ia_webmail + icecast_header exploit/windows/http/icecast_header + ie_objecttype exploit/windows/browser/ms03_020_ie_objecttype + ie_vml_rectfill exploit/windows/browser/ms06_055_vml_method + ie_webview_setslice exploit/windows/browser/webview_setslice + ie_xp_pfv_metafile exploit/windows/browser/ms06_001_wmf_setabortproc + iis40_htr exploit/windows/iis/ms02_018_htr + iis50_printer_overflow exploit/windows/iis/ms01_023_printer + iis50_webdav_ntdll exploit/windows/iis/ms03_007_ntdll_webdav + iis_fp30reg_chunked exploit/windows/isapi/fp30reg_chunked + iis_nsiislog_post exploit/windows/isapi/nsiislog_post + iis_w3who_overflow exploit/windows/isapi/w3who_query + imail_imap_delete exploit/windows/imap/imail_delete + imail_ldap exploit/windows/ldap/imail_thc + irix_lpsched_exec exploit/irix/lpd/tagprinter_exec + kerio_auth exploit/windows/firewall/kerio_auth + lsass_ms04_011 exploit/windows/smb/ms04_011_lsass + mailenable_imap exploit/windows/imap/mailenable_status + mailenable_imap_w3c exploit/windows/imap/mailenable_w3c_select + maxdb_webdbm_get_overflow exploit/windows/http/maxdb_webdbm_get_overflow + mdaemon_imap_cram_md5 exploit/windows/imap/mdaemon_cram_md5 + mercury_imap exploit/windows/imap/mercury_rename + minishare_get_overflow exploit/windows/http/minishare_get_overflow + mozilla_compareto exploit/multi/browser/mozilla_compareto + ms05_039_pnp exploit/windows/smb/ms05_039_pnp + msasn1_ms04_007_killbill exploit/windows/smb/ms04_007_killbill + msmq_deleteobject_ms05_017 exploit/windows/dcerpc/ms05_017_msmq + msrpc_dcom_ms03_026 exploit/windows/dcerpc/ms03_026_dcom + mssql2000_preauthentication exploit/windows/mssql/ms02_056_hello + mssql2000_resolution exploit/windows/mssql/ms02_039_slammer + netapi_ms06_040 exploit/windows/smb/ms06_040_netapi + netterm_netftpd_user_overflow exploit/windows/ftp/netterm_netftpd_user + niprint_lpd exploit/windows/lpd/niprint + novell_messenger_acceptlang exploit/windows/http/novell_messenger_acceptlang + oracle9i_xdb_ftp exploit/windows/ftp/oracle9i_xdb_ftp_unlock + oracle9i_xdb_ftp_pass exploit/windows/ftp/oracle9i_xdb_ftp_pass + oracle9i_xdb_http exploit/windows/http/oracle9i_xdb_pass + payload_handler exploit/multi/handler + peercast_url_linux exploit/linux/http/peercast_url + peercast_url_win32 exploit/windows/http/peercast_url. + php_vbulletin_template exploit/unix/http/php_vbulletin_template + php_xmlrpc_eval exploit/unix/http/php_xmlrpc_eval + realserver_describe_linux exploit/multi/realserver/describe + rras_ms06_025 exploit/windows/smb/ms06_025_rras + rras_ms06_025_rasman exploit/windows/smb/ms06_025_rasmans_reg + rsa_iiswebagent_redirect exploit/windows/isapi/rsa_webagent_redirect + safari_safefiles_exec exploit/osx/browser/safari_metadata_archive + samba_nttrans exploit/multi/samba/nttrans + samba_trans2open_osx exploit/osx/samba/trans2open + samba_trans2open_solsparc exploit/solaris/samba/trans2open + sentinel_lm7_overflow exploit/windows/license/sentinel_lm7_udp + servu_mdtm_overflow exploit/windows/ftp/servu_mdtm + shixxnote_font exploit/windows/misc/shixxnote_font + shoutcast_format_win32 exploit/windows/http/shoutcast_format + slimftpd_list_concat exploit/windows/ftp/slimftpd_list_concat + solaris_dtspcd_noir exploit/solaris/dtspcd/heap_noir + solaris_lpd_exec exploit/solaris/lpd/sendmail_exec + solaris_lpd_unlink auxiliary/dos/solaris/lpd/cascade_delete + solaris_sadmind_exec exploit/solaris/sunrpc/solaris_sadmind_exec + solaris_ttyprompt exploit/solaris/telnet/ttyprompt + tftpd32_long_filename exploit/windows/tftp/tftpd32_long_filename + trackercam_phparg_overflow exploit/windows/http/trackercam_phparg_overflow + ut2004_secure_linux exploit/linux/games/ut2004_secure + ut2004_secure_win32 exploit/windows/games/ut2004_secure + warftpd_165_user exploit/windows/ftp/warftpd_165_user + webstar_ftp_user exploit/osx/ftp/webstar_ftp_user + winamp_playlist_unc exploit/windows/browser/winamp_playlist_unc + windows_ssl_pct exploit/windows/ssl/ms04_011_pct + wins_ms04_045 exploit/windows/wins/ms04_045_wins + wsftp_server_503_mkd exploit/windows/ftp/wsftp_server_503_mkd + ypops_smtp exploit/windows/smtp/ypops_overflow1 + zenworks_desktop_agent exploit/windows/novell/zenworks_desktop_agent