1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Massive whitespace cleanup

This commit is contained in:
sinn3r 2012-03-18 00:07:27 -05:00 committed by James Lee
parent ef8b9fd5ce
commit a7acb638af
12 changed files with 40 additions and 58 deletions

View File

@ -73,4 +73,4 @@ class Metasploit3 < Msf::Auxiliary
print_status("File saved in: #{path}")
end
end
end
end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare ESX/ESXi Fingerprint Scanner',
'Version' => '$Revision$',
'Description' => %Q{
This module accesses the web API interfaces for VMware ESX/ESXi servers
and attempts to identify version information for that server.},
This module accesses the web API interfaces for VMware ESX/ESXi servers
and attempts to identify version information for that server.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE
)
@ -34,7 +35,7 @@ class Metasploit3 < Msf::Auxiliary
register_options([Opt::RPORT(443),
OptString.new('URI', [false, 'The uri path to test against' , '/sdk'])
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -98,4 +99,3 @@ class Metasploit3 < Msf::Auxiliary
end
end

View File

@ -25,10 +25,11 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Permissions',
'Version' => '$Revision$',
'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate
all the user/group permissions. Unlike enum suers this is only
users and groups that specifically have permissions defined within
the VMware product},
This module will log into the Web API of VMWare and try to enumerate
all the user/group permissions. Unlike enum suers this is only
users and groups that specifically have permissions defined within
the VMware product
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE
)
@ -37,9 +38,9 @@ class Metasploit3 < Msf::Auxiliary
[
Opt::RPORT(443),
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -64,7 +65,7 @@ class Metasploit3 < Msf::Auxiliary
}
end
end
esx_permissions = vim_get_all_permissions
case esx_permissions
when :noresponse
@ -93,8 +94,4 @@ class Metasploit3 < Msf::Auxiliary
end
end
end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Active Sessions',
'Version' => '$Revision$',
'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate
all the login sessions.},
This module will log into the Web API of VMWare and try to enumerate
all the login sessions.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE
)
@ -37,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -80,8 +81,4 @@ class Metasploit3 < Msf::Auxiliary
end
end
end

View File

@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate User Accounts',
'Version' => '$Revision$',
'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate
all the user accounts. If the VMware instance is connected to one or
more domains, it will try to enumerate domain users as well.},
This module will log into the Web API of VMWare and try to enumerate
all the user accounts. If the VMware instance is connected to one or
more domains, it will try to enumerate domain users as well.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE
)
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -135,8 +136,4 @@ class Metasploit3 < Msf::Auxiliary
end
end
end

View File

@ -24,8 +24,9 @@ class Metasploit3 < Msf::Auxiliary
super(
'Name' => 'VMWare Enumerate Virtual Machines',
'Description' => %Q{
This module attempts to discover virtual machines on any VMWare instance
running the web interface. This would include ESX/ESXi and VMWare Server.},
This module attempts to discover virtual machines on any VMWare instance
running the web interface. This would include ESX/ESXi and VMWare Server.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE
)
@ -37,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
OptBool.new('SCREENSHOT', [true, "Wheter or not to try to take a screenshot", true])
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -83,9 +84,4 @@ class Metasploit3 < Msf::Auxiliary
end
end
end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Host Details',
'Version' => '$Revision$',
'Description' => %Q{
This module attempts to enumerate information about the host systems through the VMWare web API.
This can include information about the hardware installed on the host machine.},
This module attempts to enumerate information about the host systems through the VMWare web API.
This can include information about the hardware installed on the host machine.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE
)
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
OptBool.new('HW_DETAILS', [true, "Enumerate the Hardware on the system as well?", false])
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -57,9 +58,4 @@ class Metasploit3 < Msf::Auxiliary
end
end
end

View File

@ -40,7 +40,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('URI', [true, "The default URI to login with", "/sdk"]),
Opt::RPORT(443)
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -133,4 +133,3 @@ class Metasploit3 < Msf::Auxiliary
end

View File

@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Screenshot Stealer',
'Version' => '$Revision$',
'Description' => %Q{
This module uses supplied login credentials to connect to VMWare via
the web interface. It then searches through the datastores looking for screenshots.
It will downlaod any screenshots it finds and save them as loot.},
This module uses supplied login credentials to connect to VMWare via
the web interface. It then searches through the datastores looking for screenshots.
It will downlaod any screenshots it finds and save them as loot.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE
)
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end
@ -105,8 +106,7 @@ class Metasploit3 < Msf::Auxiliary
else
print_error "Failed to retrieve screenshot: there was no reply"
end
end
end

View File

@ -84,4 +84,4 @@ class Metasploit3 < Msf::Post
save(f, output) if output !~ /No such file or directory/
end
end
end
end

View File

@ -98,4 +98,4 @@ class Metasploit3 < Msf::Post
print_status("Installed applications saved to notes.")
end
end
end

View File

@ -295,4 +295,4 @@ end
=begin
Adium:
/Users/[username]/Library/Application\ Support/Adium\ 2.0/
=end
=end