1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

BSD license the default for non-msfdev created modules.

git-svn-id: file:///home/svn/incoming/trunk@3636 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore 2006-05-06 16:34:39 +00:00
parent 71ac31446f
commit d086a1bedf
36 changed files with 36 additions and 36 deletions

View File

@ -19,7 +19,7 @@ class AlphaMixed < Msf::Encoder::Alphanum
},
'Author' => [ 'pusscat', 'skylined' ],
'Arch' => ARCH_X86,
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'EncoderType' => Msf::Encoder::Type::AlphanumMixed,
'Decoder' =>
{

View File

@ -19,7 +19,7 @@ class AlphaUpper < Msf::Encoder::Alphanum
},
'Author' => [ 'pusscat' 'skylined' ],
'Arch' => ARCH_X86,
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'EncoderType' => Msf::Encoder::Type::AlphanumUpper,
'Decoder' =>
{

View File

@ -21,7 +21,7 @@ class NonAlpha < Msf::Encoder::NonAlpha
},
'Author' => [ 'pusscat'],
'Arch' => ARCH_X86,
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'EncoderType' => Msf::Encoder::Type::NonAlpha,
'Decoder' =>
{

View File

@ -19,7 +19,7 @@ class UnicodeMixed < Msf::Encoder::Alphanum
},
'Author' => [ 'pusscat', 'skylined' ],
'Arch' => ARCH_X86,
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'EncoderType' => Msf::Encoder::Type::AlphanumUnicodeMixed,
'Decoder' =>
{

View File

@ -19,7 +19,7 @@ class UnicodeUpper < Msf::Encoder::Alphanum
},
'Author' => [ 'pusscat', 'skylined' ],
'Arch' => ARCH_X86,
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'EncoderType' => Msf::Encoder::Type::AlphanumUnicodeUpper,
'Decoder' =>
{

View File

@ -26,7 +26,7 @@ class Exploits::Linux::Games::UT2004_Secure < Msf::Exploit::Remote
},
'Author' => [ 'onetwo' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Linux::Http::PeerCast_URL < Msf::Exploit::Remote
},
'Author' => [ 'y0 [at] w00t-shell.net' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Linux::Ids::Snortbopre < Msf::Exploit::Remote
full root or administrative privileges.
},
'Author' => 'KaiJern Lau <xwings [at] mysec.org>',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -14,7 +14,7 @@ class Exploits::Solaris::Telnet::TTYPrompt_Auth_Bypass < Msf::Exploit::Remote
application to bypass authentication in the telnet daemon.
},
'Author' => [ 'MC', 'cazz' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -17,7 +17,7 @@ class Exploits::Unix::Http::PhpvBulletinTemplateName < Msf::Exploit::Remote
affected.
},
'Author' => [ 'str0ke <str0ke@milw0rm.com>', 'cazz' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' => [
[ 'OSVDB', '14047'],

View File

@ -15,7 +15,7 @@ class Exploits::Windows::Ftp::GlobalScapeInputOverflow < Msf::Exploit::Remote
or anonymous access) is required for this exploit to work.
},
'Author' => [ 'Fairuzan Roslan <riaf [at] mysec.org>', 'Mati Aharoni <mati [at] see-security.com>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -20,7 +20,7 @@ class Exploits::Windows::Ftp::Oracle9iXDPPassOverflow < Msf::Exploit::Remote
},
'Author' => [ 'y0 <y0[at]w00t-shell.net>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -22,7 +22,7 @@ class Exploits::Windows::Ftp::Oracle9iXDBUnlockOverflow < Msf::Exploit::Remote
},
'Author' => [ 'y0 <y0@w00t-shell.net>', 'David Litchfield <david@ngssoftware.com>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Ftp::SlimFTPdListConcatOverflow < Msf::Exploit::Remote
},
'Author' => [ 'Fairuzan Roslan <riaf [at] mysec.org>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -14,7 +14,7 @@ class Exploits::Windows::Ftp::WarFtpd165 < Msf::Exploit::Remote
of War-FTPD 1.65.
},
'Author' => 'Fairuzan Roslan <riaf [at] mysec.org>',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Ftp::WSFTPDMKDOverflow < Msf::Exploit::Remote
},
'Author' => [ 'ET LoWNOISE <et@cyberspace.org>', 'Reed Arvin <reedarvin@gmail.com>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -26,7 +26,7 @@ class Exploits::Windows::Games::UT2004_Secure < Msf::Exploit::Remote
},
'Author' => [ 'stinko' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Http::ALTN_WebAdmin_Overflow < Msf::Exploit::Remote
execution with SYSTEM level privileges.
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Http::EDirectory_IMonitor_Overflow < Msf::Exploit::Remo
},
'Author' => [ 'anonymous' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -19,7 +19,7 @@ class Exploits::Windows::Http::Minishare_GET_Overflow < Msf::Exploit::Remote
},
'Author' => [ 'acaro <acaro@jervus.it>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Http::Shoutcast_Format < Msf::Exploit::Remote
},
'Author' => [ 'MC', 'mandragore[at]gmail.com'],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -23,7 +23,7 @@ class Exploits::Windows::Iis::MS02_018_HTR < Msf::Exploit::Remote
},
'Author' => [ 'stinko' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Imap::MailEnableImapStatusOverflow < Msf::Exploit::Remo
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -20,7 +20,7 @@ class Exploits::Windows::Imap::MailEnableImapW3CLoggingSelectOverflow < Msf::Exp
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Imap::MDaemonImapCramMD5Overflow < Msf::Exploit::Remote
},
'Author' => [ 'anonymous' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -14,7 +14,7 @@ class Exploits::Windows::Imap::MercuryIMAPRenameOverflow < Msf::Exploit::Remote
Mercury/32 v.4.01a IMAP service.
},
'Author' => [ 'MC' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -24,7 +24,7 @@ class Exploits::Windows::License::CA_Client_GETCONFIG < Msf::Exploit::Remote
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::License::REMOVE_THIS::CA_Server_GETCONFIG < Msf::Exploi
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Mssql::MS02_056_HelloOverflow < Msf::Exploit::Remote
},
'Author' => [ 'MC <y0@w00t-shell.net>' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -16,7 +16,7 @@ class Exploits::Windows::Novell::ZenworksDesktopAgentOverflow < Msf::Exploit::Re
},
'Author' => [ 'anonymous' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ class Exploits::Windows::Smb::MS04_039_NETDDE < Msf::Exploit::Remote
pipe is only accessible after successful authentication.
},
'Author' => [ 'pusscat' ],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Version' => '$Revision$',
'References' =>
[

View File

@ -18,7 +18,7 @@ module BindPerl
'Version' => '$Revision$',
'Description' => 'Listen for a connection and spawn a command shell via perl (persistent)',
'Author' => ['Samy <samy@samy.pl>', 'cazz'],
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'Handler' => Msf::Handler::BindTcp,

View File

@ -18,7 +18,7 @@ module ReversePerl
'Version' => '$Revision$',
'Description' => 'Creates an interactive shell via perl',
'Author' => 'cazz',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'Handler' => Msf::Handler::ReverseTcp,

View File

@ -18,7 +18,7 @@ module ShellBindTcp
'Version' => '$Revision$',
'Description' => 'Listen for a connection and spawn a command shell',
'Author' => 'bighawk <bighawk@warfare.com>',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Platform' => 'solaris',
'Arch' => ARCH_X86,
'Handler' => Msf::Handler::BindTcp,

View File

@ -18,7 +18,7 @@ module ShellFindPort
'Version' => '$Revision$',
'Description' => 'Spawn a shell on an established connection',
'Author' => 'LSD <unknown@lsd>',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Platform' => 'solaris',
'Arch' => ARCH_X86,
'Handler' => Msf::Handler::FindPort,

View File

@ -18,7 +18,7 @@ module ShellReverseTcp
'Version' => '$Revision$',
'Description' => 'Connect back to attacker and spawn a command shell',
'Author' => 'bighawk <bighawk@warfare.com>',
'License' => MSF_LICENSE,
'License' => BSD_LICENSE,
'Platform' => 'solaris',
'Arch' => ARCH_X86,
'Handler' => Msf::Handler::ReverseTcp,