This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description = [[ | |
Attempts to retrieve device information from an Internet Gateway Device (IGD) | |
UPnP configuration file. | |
For more information, see: | |
http://upnp.org/specs/gw/igd2 | |
http://en.wikipedia.org/wiki/Internet_Gateway_Device_Protocol | |
]] | |
--- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description = [[ | |
Attempts to retrieve all valid usernames from the HTTP component of Carel | |
Pl@ntVisor (CarelDataServer.exe). | |
]] | |
--- | |
-- @usage | |
-- nmap --script http-carel-data-server-users -p <port> <host> | |
-- | |
-- @output |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description = [[ | |
Retrieves all HTTP "server" headers. | |
]] | |
--- | |
-- @usage | |
-- nmap --script http-server -p <port> <host> | |
-- | |
-- @output | |
-- PORT STATE SERVICE REASON |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description = [[ | |
Attempts to retrieve device information from a 3COM NBX phone system using the | |
web interface. The web interface (NBX NetSet utility) runs on port 80 by | |
default. | |
]] | |
--- | |
-- @usage | |
-- nmap --script http-3com-nbx-info -p <port> <host> | |
-- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description = [[ | |
Retrieves information from a listening acarsd daemon. | |
acarsd is an ACARS decoder for a Linux or Windows PC which attempts to decode ACARS transmissions in real-time. The information retrieved includes the daemon version, API version, administrator e-mail address and listening frequency. | |
For more information about acarsd, see: | |
* http://www.acarsd.org/ | |
]] | |
--- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This file is part of the Metasploit Framework and may be subject to | |
# redistribution and commercial restrictions. Please see the Metasploit | |
# Framework web site for more information on licensing and terms of use. | |
# http://metasploit.com/framework/ | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Based on work by Joe Giron @theonlyevil1 | |
// http://www.gironsec.com/blog/tag/cracking-smartermail/ | |
using System; | |
using System.Collections.Generic; | |
using System.Text; | |
using System.IO; | |
using System.Security.Cryptography; | |
namespace TicketCounter | |
{ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http//metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = AverageRanking |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http//metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
include Msf::Auxiliary::Scanner |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env ruby | |
# Throttled single-threaded remote dictionary attack tool | |
# for Doom multiplayer server connection password. | |
# Tested on Zandronum 1.2.42016.1 | |
# 2014-12-20 | |
## | |
require 'socket' | |
$debug = false |