1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Massive whitespace cleanup

This commit is contained in:
sinn3r 2012-03-18 00:07:27 -05:00 committed by James Lee
parent ef8b9fd5ce
commit a7acb638af
12 changed files with 40 additions and 58 deletions

View File

@ -73,4 +73,4 @@ class Metasploit3 < Msf::Auxiliary
print_status("File saved in: #{path}") print_status("File saved in: #{path}")
end end
end end
end end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare ESX/ESXi Fingerprint Scanner', 'Name' => 'VMWare ESX/ESXi Fingerprint Scanner',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module accesses the web API interfaces for VMware ESX/ESXi servers This module accesses the web API interfaces for VMware ESX/ESXi servers
and attempts to identify version information for that server.}, and attempts to identify version information for that server.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -34,7 +35,7 @@ class Metasploit3 < Msf::Auxiliary
register_options([Opt::RPORT(443), register_options([Opt::RPORT(443),
OptString.new('URI', [false, 'The uri path to test against' , '/sdk']) OptString.new('URI', [false, 'The uri path to test against' , '/sdk'])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -98,4 +99,3 @@ class Metasploit3 < Msf::Auxiliary
end end
end end

View File

@ -25,10 +25,11 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Permissions', 'Name' => 'VMWare Enumerate Permissions',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate This module will log into the Web API of VMWare and try to enumerate
all the user/group permissions. Unlike enum suers this is only all the user/group permissions. Unlike enum suers this is only
users and groups that specifically have permissions defined within users and groups that specifically have permissions defined within
the VMware product}, the VMware product
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -37,9 +38,9 @@ class Metasploit3 < Msf::Auxiliary
[ [
Opt::RPORT(443), Opt::RPORT(443),
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]), OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]), OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -64,7 +65,7 @@ class Metasploit3 < Msf::Auxiliary
} }
end end
end end
esx_permissions = vim_get_all_permissions esx_permissions = vim_get_all_permissions
case esx_permissions case esx_permissions
when :noresponse when :noresponse
@ -93,8 +94,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Active Sessions', 'Name' => 'VMWare Enumerate Active Sessions',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate This module will log into the Web API of VMWare and try to enumerate
all the login sessions.}, all the login sessions.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -37,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]), OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]) OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -80,8 +81,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate User Accounts', 'Name' => 'VMWare Enumerate User Accounts',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module will log into the Web API of VMWare and try to enumerate This module will log into the Web API of VMWare and try to enumerate
all the user accounts. If the VMware instance is connected to one or all the user accounts. If the VMware instance is connected to one or
more domains, it will try to enumerate domain users as well.}, more domains, it will try to enumerate domain users as well.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]), OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]) OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -135,8 +136,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -24,8 +24,9 @@ class Metasploit3 < Msf::Auxiliary
super( super(
'Name' => 'VMWare Enumerate Virtual Machines', 'Name' => 'VMWare Enumerate Virtual Machines',
'Description' => %Q{ 'Description' => %Q{
This module attempts to discover virtual machines on any VMWare instance This module attempts to discover virtual machines on any VMWare instance
running the web interface. This would include ESX/ESXi and VMWare Server.}, running the web interface. This would include ESX/ESXi and VMWare Server.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -37,7 +38,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]), OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
OptBool.new('SCREENSHOT', [true, "Wheter or not to try to take a screenshot", true]) OptBool.new('SCREENSHOT', [true, "Wheter or not to try to take a screenshot", true])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -83,9 +84,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -25,8 +25,9 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Enumerate Host Details', 'Name' => 'VMWare Enumerate Host Details',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module attempts to enumerate information about the host systems through the VMWare web API. This module attempts to enumerate information about the host systems through the VMWare web API.
This can include information about the hardware installed on the host machine.}, This can include information about the hardware installed on the host machine.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]), OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]),
OptBool.new('HW_DETAILS', [true, "Enumerate the Hardware on the system as well?", false]) OptBool.new('HW_DETAILS', [true, "Enumerate the Hardware on the system as well?", false])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -57,9 +58,4 @@ class Metasploit3 < Msf::Auxiliary
end end
end end
end end

View File

@ -40,7 +40,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('URI', [true, "The default URI to login with", "/sdk"]), OptString.new('URI', [true, "The default URI to login with", "/sdk"]),
Opt::RPORT(443) Opt::RPORT(443)
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -133,4 +133,3 @@ class Metasploit3 < Msf::Auxiliary
end end

View File

@ -25,9 +25,10 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'VMWare Screenshot Stealer', 'Name' => 'VMWare Screenshot Stealer',
'Version' => '$Revision$', 'Version' => '$Revision$',
'Description' => %Q{ 'Description' => %Q{
This module uses supplied login credentials to connect to VMWare via This module uses supplied login credentials to connect to VMWare via
the web interface. It then searches through the datastores looking for screenshots. the web interface. It then searches through the datastores looking for screenshots.
It will downlaod any screenshots it finds and save them as loot.}, It will downlaod any screenshots it finds and save them as loot.
},
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'], 'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
) )
@ -38,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]), OptString.new('USERNAME', [ true, "The username to Authenticate with.", 'root' ]),
OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ]) OptString.new('PASSWORD', [ true, "The password to Authenticate with.", 'password' ])
], self.class) ], self.class)
register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),]) register_advanced_options([OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', true]),])
end end
@ -105,8 +106,7 @@ class Metasploit3 < Msf::Auxiliary
else else
print_error "Failed to retrieve screenshot: there was no reply" print_error "Failed to retrieve screenshot: there was no reply"
end end
end end
end end

View File

@ -84,4 +84,4 @@ class Metasploit3 < Msf::Post
save(f, output) if output !~ /No such file or directory/ save(f, output) if output !~ /No such file or directory/
end end
end end
end end

View File

@ -98,4 +98,4 @@ class Metasploit3 < Msf::Post
print_status("Installed applications saved to notes.") print_status("Installed applications saved to notes.")
end end
end end

View File

@ -295,4 +295,4 @@ end
=begin =begin
Adium: Adium:
/Users/[username]/Library/Application\ Support/Adium\ 2.0/ /Users/[username]/Library/Application\ Support/Adium\ 2.0/
=end =end