1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00

fix some non-full-namespace includes

git-svn-id: file:///home/svn/framework3/trunk@10617 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Joshua Drake 2010-10-09 06:55:52 +00:00
parent 8aa73c2951
commit ae04e34cf7
14 changed files with 17 additions and 17 deletions

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Exploit::Remote::Smtp
include Msf::Exploit::Remote::Smtp
include Msf::Auxiliary::Dos
def initialize(info = {})

View File

@ -11,8 +11,8 @@
class Metasploit3 < Msf::Auxiliary
include Exploit::Remote::Tcp
include Auxiliary::Dos
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,

View File

@ -734,8 +734,8 @@ class Metasploit3 < Msf::Auxiliary
end
# consider abstracting this out to a method (probably
# with a different name) of Auxiliary::Report or
# Exploit::Remote::HttpServer
# with a different name) of Msf::Auxiliary::Report or
# Msf::Exploit::Remote::HttpServer
def record_detection(cli, request)
os_name = nil
os_flavor = nil

View File

@ -14,8 +14,8 @@ require 'msf/core'
# Fake Telnet Service - Kris Katterjohn 09/28/2008
class Metasploit3 < Msf::Auxiliary
include Exploit::Remote::TcpServer
include Auxiliary::Report
include Msf::Exploit::Remote::TcpServer
include Msf::Auxiliary::Report
def initialize
super(

View File

@ -16,7 +16,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Exploit::Remote::Tcp
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Exploit::Remote::Tcp
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
include Exploit::Remote::Tcp
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
include Exploit::Remote::Udp
include Msf::Exploit::Remote::Udp
def initialize(info = {})
super(update_info(info,

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
include Exploit::Remote::TcpServer
include Msf::Exploit::Remote::TcpServer
def initialize(info = {})
super(update_info(info,

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
include Exploit::Remote::TcpServer
include Msf::Exploit::Remote::TcpServer
def initialize(info = {})
super(update_info(info,

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Exploit::Remote::Tcp
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,

View File

@ -76,7 +76,7 @@ class Metasploit3 < Msf::Exploit::Remote
sploit = "sh msg*" # Execute the clamav-milter temporary file.
# Create the malicious RCPT TO before connecting,
# to make good use of the Exploit::Smtp support.
# to make good use of the Msf::Exploit::Smtp support.
oldaddr = datastore['MAILTO']
newaddr = oldaddr.split('@')

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
include Exploit::Remote::TcpServer
include Msf::Exploit::Remote::TcpServer
def initialize(info = {})
super(update_info(info,

View File

@ -14,7 +14,7 @@ require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking
include Exploit::Remote::Tcp
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,