mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Adding missing Id and Rev SVN keywords.
git-svn-id: file:///home/svn/framework3/trunk@13961 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
6e6b5aa926
commit
ea2c9d1a46
@ -1,3 +1,7 @@
|
||||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
|
@ -1,3 +1,7 @@
|
||||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
|
@ -1,3 +1,7 @@
|
||||
##
|
||||
# $Id: $
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'Oracle Password Hashdump',
|
||||
'Version' => '$ $',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module dumps the usernames and password hashes
|
||||
from Oracle given the propper Credentials and SID.
|
||||
|
@ -1,5 +1,5 @@
|
||||
##
|
||||
# $ $
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'SAP Management Console Version Detection',
|
||||
'Version' => 'Working Copy',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
This module simply attempts to identify the version of SAP
|
||||
through the SAP Management Console SOAP Interface.
|
||||
|
@ -1,3 +1,7 @@
|
||||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
|
@ -1,4 +1,9 @@
|
||||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
#
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# Framework web site for more information on licensing and terms of use.
|
||||
|
@ -1,3 +1,7 @@
|
||||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
|
@ -1,3 +1,7 @@
|
||||
##
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
@ -21,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
'Description' => 'This module emulates a webserver leaking PII data',
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => 'MJC',
|
||||
'Version' => '$Revision$',
|
||||
'Version' => '$Revision: $',
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://www.metasploit.com'],
|
||||
|
@ -22,6 +22,7 @@ class Metasploit3 < Msf::Post
|
||||
def initialize(info={})
|
||||
super( update_info( info,
|
||||
'Name' => 'Windows Gather SmartFTP Saved Password Extraction',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{ This module finds saved login credentials
|
||||
for the SmartFTP FTP client for windows.
|
||||
It finds the saved passwords and decrypts
|
||||
|
@ -25,6 +25,7 @@ class Metasploit3 < Msf::Post
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => 'Windows Gather WinSCP Saved Password Extraction',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
This module extracts weakly encrypted saved passwords from
|
||||
WinSCP. It searches for saved sessions in the Windows Registry
|
||||
|
@ -1,5 +1,5 @@
|
||||
##
|
||||
# $Id:
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
|
Loading…
Reference in New Issue
Block a user