1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Massive whitespace cleanup

This commit is contained in:
sinn3r 2012-03-18 00:07:27 -05:00 committed by James Lee
parent ef8b9fd5ce
commit a7acb638af
12 changed files with 40 additions and 58 deletions

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare ESX/ESXi Fingerprint Scanner', 'Name' => 'VMWare ESX/ESXi Fingerprint Scanner',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module accesses the web API interfaces for VMware ESX/ESXi servers This module accesses the web API interfaces for VMware ESX/ESXi servers
and attempts to identify version information for that server.}, and attempts to identify version information for that server.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -98,4 +99,3 @@ class Metasploit3 < Msf::Auxiliary
end end
end end

View File

@ -25,10 +25,11 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Permissions', 'Name' => 'VMWare Enumerate Permissions',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate This module will log into the Web API of VMWare and try to enumerate
all the user/group permissions. Unlike enum suers this is only all the user/group permissions. Unlike enum suers this is only
users and groups that specifically have permissions defined within users and groups that specifically have permissions defined within
the VMware product}, the VMware product
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -37,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
[ [
Opt::RPORT(443), Opt::RPORT(443),
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]), OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]), OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
@ -93,8 +94,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Active Sessions', 'Name' => 'VMWare Enumerate Active Sessions',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate This module will log into the Web API of VMWare and try to enumerate
all the login sessions.}, all the login sessions.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -80,8 +81,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate User Accounts', 'Name' => 'VMWare Enumerate User Accounts',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate This module will log into the Web API of VMWare and try to enumerate
all the user accounts. If the VMware instance is connected to one or all the user accounts. If the VMware instance is connected to one or
more domains, it will try to enumerate domain users as well.}, more domains, it will try to enumerate domain users as well.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -135,8 +136,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -24,8 +24,9 @@ class Metasploit3 < Msf::Auxiliary
super( super(
'Name' => 'VMWare Enumerate Virtual Machines', 'Name' => 'VMWare Enumerate Virtual Machines',
'Description' => %Q{ 'Description' => %Q{
This module attempts to discover virtual machines on any VMWare instance This module attempts to discover virtual machines on any VMWare instance
running the web interface. This would include ESX/ESXi and VMWare Server.}, running the web interface. This would include ESX/ESXi and VMWare Server.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -83,9 +84,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Host Details', 'Name' => 'VMWare Enumerate Host Details',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module attempts to enumerate information about the host systems through the VMWare web API. This module attempts to enumerate information about the host systems through the VMWare web API.
This can include information about the hardware installed on the host machine.}, This can include information about the hardware installed on the host machine.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -57,9 +58,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -133,4 +133,3 @@ class Metasploit3 < Msf::Auxiliary
end end

View File

@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Screenshot Stealer', 'Name' => 'VMWare Screenshot Stealer',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module uses supplied login credentials to connect to VMWare via This module uses supplied login credentials to connect to VMWare via
the web interface. It then searches through the datastores looking for screenshots. the web interface. It then searches through the datastores looking for screenshots.
It will downlaod any screenshots it finds and save them as loot.}, It will downlaod any screenshots it finds and save them as loot.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -109,4 +110,3 @@ class Metasploit3 < Msf::Auxiliary
end end
end end