1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Adding missing Id and Rev SVN keywords.

git-svn-id: file:///home/svn/framework3/trunk@13961 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Tod Beardsley 2011-10-17 01:27:28 +00:00
parent 6e6b5aa926
commit ea2c9d1a46
13 changed files with 36 additions and 5 deletions

View File

@ -1,3 +1,7 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,3 +1,7 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,3 +1,7 @@
##
# $Id: $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Oracle Password Hashdump',
'Version' => '$ $',
'Version' => '$Revision$',
'Description' => %Q{
This module dumps the usernames and password hashes
from Oracle given the propper Credentials and SID.

View File

@ -1,5 +1,5 @@
##
# $ $
# $Id$
##
##

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'SAP Management Console Version Detection',
'Version' => 'Working Copy',
'Version' => '$Revision$',
'Description' => %q{
This module simply attempts to identify the version of SAP
through the SAP Management Console SOAP Interface.

View File

@ -1,3 +1,7 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,4 +1,9 @@
##
# $Id$
##
##
#
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.

View File

@ -1,3 +1,7 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,3 +1,7 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
@ -21,7 +25,7 @@ class Metasploit3 < Msf::Auxiliary
'Description' => 'This module emulates a webserver leaking PII data',
'License' => MSF_LICENSE,
'Author' => 'MJC',
'Version' => '$Revision$',
'Version' => '$Revision: $',
'References' =>
[
[ 'URL', 'http://www.metasploit.com'],

View File

@ -22,6 +22,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super( update_info( info,
'Name' => 'Windows Gather SmartFTP Saved Password Extraction',
'Version' => '$Revision$',
'Description' => %q{ This module finds saved login credentials
for the SmartFTP FTP client for windows.
It finds the saved passwords and decrypts

View File

@ -25,6 +25,7 @@ class Metasploit3 < Msf::Post
def initialize(info={})
super(update_info(info,
'Name' => 'Windows Gather WinSCP Saved Password Extraction',
'Version' => '$Revision$',
'Description' => %q{
This module extracts weakly encrypted saved passwords from
WinSCP. It searches for saved sessions in the Windows Registry

View File

@ -1,5 +1,5 @@
##
# $Id:
# $Id$
##
##