Skip to content

Commit a177050

Browse files
committed
Brute force modules should be named service_login
1 parent 47dbabf commit a177050

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

documentation/modules/auxiliary/scanner/ivanti/login_scanner.md renamed to documentation/modules/auxiliary/scanner/ivanti/ivanti_login.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ It allows to attack both regular user and admin as well - you can select which t
99

1010
## Verification Steps
1111

12-
1. `use auxiliary/scanner/ivanti/login_scanner`
12+
1. `use auxiliary/scanner/ivanti/ivanti_login`
1313
2. `set RHOSTS [IP]`
1414
3. either `set USERNAME [username]` or `set USERPASS_FILE [usernames file]`
1515
4. either `set PASSWORD [password]` or `set PASS_FILE [passwords file]`

modules/auxiliary/scanner/ivanti/login_scanner.rb renamed to modules/auxiliary/scanner/ivanti/ivanti_login.rb

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,16 @@ class MetasploitModule < Msf::Auxiliary
99
include Msf::Auxiliary::Scanner
1010
include Msf::Auxiliary::ReportSummary
1111

12+
include Msf::Exploit::Deprecated
13+
moved_from 'auxiliary/scanner/ivanti/login_scanner'
14+
1215
def initialize(info = {})
1316
super(
1417
update_info(
1518
info,
1619
'Name' => 'Ivanti Connect Secure HTTP Scanner',
1720
'Description' => %q{
18-
This module will perform authentication scanning against Ivanti Connect Secure
21+
This module will perform authentication scanning against Ivanti Connect Secure.
1922
},
2023
'Author' => ['msutovsky-r7'],
2124
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)