mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
Land #8791 - Update Accuvant refs to point to Optiv
This commit is contained in:
commit
54ded4300e
@ -32,7 +32,7 @@ class MetasploitModule < Msf::Auxiliary
|
||||
'References' => [
|
||||
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
|
||||
[ 'OSVDB', '3106'],
|
||||
[ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ],
|
||||
[ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ],
|
||||
[ 'URL', 'http://sourceforge.net/projects/smbexec/' ],
|
||||
[ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ]
|
||||
]
|
||||
|
@ -32,7 +32,7 @@ class MetasploitModule < Msf::Auxiliary
|
||||
'License'=> MSF_LICENSE,
|
||||
'References' => [
|
||||
[ 'URL', 'http://sourceforge.net/projects/smbexec' ],
|
||||
[ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ]
|
||||
[ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ]
|
||||
]
|
||||
))
|
||||
|
||||
|
@ -29,7 +29,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://docs.oracle.com/javase/8/docs/technotes/guides/jmx/JMX_1_4_specification.pdf'],
|
||||
['URL', 'http://www.accuvant.com/blog/exploiting-jmx-rmi'],
|
||||
['URL', 'https://www.optiv.com/blog/exploiting-jmx-rmi'],
|
||||
['CVE', '2015-2342']
|
||||
],
|
||||
'Platform' => 'java',
|
||||
|
@ -50,7 +50,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
|
||||
[ 'OSVDB', '3106'],
|
||||
[ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ],
|
||||
[ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ],
|
||||
[ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ],
|
||||
[ 'URL', 'http://sourceforge.net/projects/smbexec/' ]
|
||||
],
|
||||
'Payload' =>
|
||||
|
@ -56,7 +56,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
'References' => [
|
||||
[ 'CVE', '1999-0504'], # Administrator with no password (since this is the default)
|
||||
[ 'OSVDB', '3106'],
|
||||
[ 'URL', 'http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access' ],
|
||||
[ 'URL', 'https://www.optiv.com/blog/owning-computers-without-shell-access' ],
|
||||
[ 'URL', 'http://sourceforge.net/projects/smbexec/' ],
|
||||
[ 'URL', 'http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx' ]
|
||||
]
|
||||
|
Loading…
Reference in New Issue
Block a user