From 8f61fe457a646e05f97b64eaa46dbfb402fa2c19 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Fri, 21 Dec 2018 13:16:16 -0800 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 135 ++++++++++++++++++++++++++++++++-- 1 file changed, 130 insertions(+), 5 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 04e11e2f39..e34a3fb120 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -30693,6 +30693,129 @@ "notes": { } }, + "auxiliary_scanner/msmail/exchange_enum": { + "name": "Exchange email enumeration", + "full_name": "auxiliary/scanner/msmail/exchange_enum", + "rank": 300, + "disclosure_date": "2018-11-06", + "type": "auxiliary", + "author": [ + "poptart", + "jlarose", + "Vincent Yiu", + "grimhacker", + "Nate Power", + "Nick Powers", + "clee-r7" + ], + "description": "Error-based user enumeration for Office 365 integrated email addresses", + "references": [ + + ], + "is_server": false, + "is_client": false, + "platform": "", + "arch": "", + "rport": null, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": null, + "mod_time": "2018-12-07 13:29:56 +0000", + "path": "/modules/auxiliary/scanner/msmail/exchange_enum.go", + "is_install_path": true, + "ref_name": "scanner/msmail/exchange_enum", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + } + }, + "auxiliary_scanner/msmail/host_id": { + "name": "Vulnerable domain identification", + "full_name": "auxiliary/scanner/msmail/host_id", + "rank": 300, + "disclosure_date": "2018-11-06", + "type": "auxiliary", + "author": [ + "poptart", + "jlarose", + "Vincent Yiu", + "grimhacker", + "Nate Power", + "Nick Powers", + "clee-r7" + ], + "description": "Identifying potentially vulnerable Exchange endpoints", + "references": [ + + ], + "is_server": false, + "is_client": false, + "platform": "", + "arch": "", + "rport": null, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": null, + "mod_time": "2018-12-07 13:29:56 +0000", + "path": "/modules/auxiliary/scanner/msmail/host_id.go", + "is_install_path": true, + "ref_name": "scanner/msmail/host_id", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + } + }, + "auxiliary_scanner/msmail/onprem_enum": { + "name": "On premise user enumeration", + "full_name": "auxiliary/scanner/msmail/onprem_enum", + "rank": 300, + "disclosure_date": "2018-11-06", + "type": "auxiliary", + "author": [ + "poptart", + "jlarose", + "Vincent Yiu", + "grimhacker", + "Nate Power", + "Nick Powers", + "clee-r7" + ], + "description": "On premise enumeration of valid exchange users", + "references": [ + + ], + "is_server": false, + "is_client": false, + "platform": "", + "arch": "", + "rport": null, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": null, + "mod_time": "2018-12-07 13:29:56 +0000", + "path": "/modules/auxiliary/scanner/msmail/onprem_enum.go", + "is_install_path": true, + "ref_name": "scanner/msmail/onprem_enum", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + } + }, "auxiliary_scanner/mssql/mssql_hashdump": { "name": "MSSQL Password Hashdump", "full_name": "auxiliary/scanner/mssql/mssql_hashdump", @@ -69172,10 +69295,10 @@ "references": [ "URL-https://insinuator.net/2017/10/erlang-distribution-rce-and-a-cookie-bruteforcer/" ], - "is_server": true, + "is_server": false, "is_client": false, - "platform": "Unix,Windows", - "arch": "cmd", + "platform": "", + "arch": "", "rport": 25672, "autofilter_ports": [ @@ -69185,9 +69308,11 @@ ], "targets": [ "Unix", - "Windows" + "Linux (CmdStager)", + "Windows", + "Windows (CmdStager)" ], - "mod_time": "2018-12-18 14:55:12 +0000", + "mod_time": "2018-12-21 07:33:37 +0000", "path": "/modules/exploits/multi/misc/erlang_cookie_rce.rb", "is_install_path": true, "ref_name": "multi/misc/erlang_cookie_rce",