mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Massive whitespace cleanup
This commit is contained in:
parent
ef8b9fd5ce
commit
a7acb638af
@ -73,4 +73,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||
print_status("File saved in: #{path}")
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
|
||||
'Name' => 'VMWare ESX/ESXi Fingerprint Scanner',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module accesses the web API interfaces for VMware ESX/ESXi servers
|
||||
and attempts to identify version information for that server.},
|
||||
This module accesses the web API interfaces for VMware ESX/ESXi servers
|
||||
and attempts to identify version information for that server.
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
@ -34,7 +35,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
register_options([Opt::RPORT(443),
|
||||
OptString.new('URI', [false, 'The uri path to test against' , '/sdk'])
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -98,4 +99,3 @@ class Metasploit3 < Msf::Auxiliary
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
|
@ -25,10 +25,11 @@ class Metasploit3 < Msf::Auxiliary
|
||||
'Name' => 'VMWare Enumerate Permissions',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module will log into the Web API of VMWare and try to enumerate
|
||||
all the user/group permissions. Unlike enum suers this is only
|
||||
users and groups that specifically have permissions defined within
|
||||
the VMware product},
|
||||
This module will log into the Web API of VMWare and try to enumerate
|
||||
all the user/group permissions. Unlike enum suers this is only
|
||||
users and groups that specifically have permissions defined within
|
||||
the VMware product
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
@ -37,9 +38,9 @@ class Metasploit3 < Msf::Auxiliary
|
||||
[
|
||||
Opt::RPORT(443),
|
||||
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
|
||||
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
|
||||
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -64,7 +65,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
}
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
esx_permissions = vim_get_all_permissions
|
||||
case esx_permissions
|
||||
when :noresponse
|
||||
@ -93,8 +94,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
|
||||
'Name' => 'VMWare Enumerate Active Sessions',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module will log into the Web API of VMWare and try to enumerate
|
||||
all the login sessions.},
|
||||
This module will log into the Web API of VMWare and try to enumerate
|
||||
all the login sessions.
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
@ -37,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
|
||||
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -80,8 +81,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
|
||||
'Name' => 'VMWare Enumerate User Accounts',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module will log into the Web API of VMWare and try to enumerate
|
||||
all the user accounts. If the VMware instance is connected to one or
|
||||
more domains, it will try to enumerate domain users as well.},
|
||||
This module will log into the Web API of VMWare and try to enumerate
|
||||
all the user accounts. If the VMware instance is connected to one or
|
||||
more domains, it will try to enumerate domain users as well.
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
|
||||
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -135,8 +136,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
@ -24,8 +24,9 @@ class Metasploit3 < Msf::Auxiliary
|
||||
super(
|
||||
'Name' => 'VMWare Enumerate Virtual Machines',
|
||||
'Description' => %Q{
|
||||
This module attempts to discover virtual machines on any VMWare instance
|
||||
running the web interface. This would include ESX/ESXi and VMWare Server.},
|
||||
This module attempts to discover virtual machines on any VMWare instance
|
||||
running the web interface. This would include ESX/ESXi and VMWare Server.
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
@ -37,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
|
||||
OptBool.new('SCREENSHOT', [true, "Wheter or not to try to take a screenshot", true])
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -83,9 +84,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
|
||||
'Name' => 'VMWare Enumerate Host Details',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module attempts to enumerate information about the host systems through the VMWare web API.
|
||||
This can include information about the hardware installed on the host machine.},
|
||||
This module attempts to enumerate information about the host systems through the VMWare web API.
|
||||
This can include information about the hardware installed on the host machine.
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
|
||||
OptBool.new('HW_DETAILS', [true, "Enumerate the Hardware on the system as well?", false])
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -57,9 +58,4 @@ class Metasploit3 < Msf::Auxiliary
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
@ -40,7 +40,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
OptString.new('URI', [true, "The default URI to login with", "/sdk"]),
|
||||
Opt::RPORT(443)
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -133,4 +133,3 @@ class Metasploit3 < Msf::Auxiliary
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
|
||||
'Name' => 'VMWare Screenshot Stealer',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module uses supplied login credentials to connect to VMWare via
|
||||
the web interface. It then searches through the datastores looking for screenshots.
|
||||
It will downlaod any screenshots it finds and save them as loot.},
|
||||
This module uses supplied login credentials to connect to VMWare via
|
||||
the web interface. It then searches through the datastores looking for screenshots.
|
||||
It will downlaod any screenshots it finds and save them as loot.
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
)
|
||||
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
|
||||
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
|
||||
], self.class)
|
||||
|
||||
|
||||
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
|
||||
end
|
||||
|
||||
@ -105,8 +106,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
else
|
||||
print_error "Failed to retrieve screenshot: there was no reply"
|
||||
end
|
||||
|
||||
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
|
@ -84,4 +84,4 @@ class Metasploit3 < Msf::Post
|
||||
save(f, output) if output !~ /No such file or directory/
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -98,4 +98,4 @@ class Metasploit3 < Msf::Post
|
||||
|
||||
print_status("Installed applications saved to notes.")
|
||||
end
|
||||
end
|
||||
end
|
||||
|
@ -295,4 +295,4 @@ end
|
||||
=begin
|
||||
Adium:
|
||||
/Users/[username]/Library/Application\ Support/Adium\ 2.0/
|
||||
=end
|
||||
=end
|
||||
|
Loading…
Reference in New Issue
Block a user