Skip to content

Commit f722f39

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 5d4aca6 commit f722f39

File tree

1 file changed

+104
-26
lines changed

1 file changed

+104
-26
lines changed

db/modules_metadata_base.json

Lines changed: 104 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -55602,14 +55602,22 @@
5560255602
"autofilter_ports": [],
5560355603
"autofilter_services": [],
5560455604
"targets": null,
55605-
"mod_time": "2024-01-07 15:02:53 +0000",
55605+
"mod_time": "2025-05-13 19:36:21 +0000",
5560655606
"path": "/modules/auxiliary/spoof/arp/arp_poisoning.rb",
5560755607
"is_install_path": true,
5560855608
"ref_name": "spoof/arp/arp_poisoning",
5560955609
"check": false,
5561055610
"post_auth": false,
5561155611
"default_credential": false,
55612-
"notes": {},
55612+
"notes": {
55613+
"Stability": [
55614+
"os-resource-loss"
55615+
],
55616+
"SideEffects": [
55617+
"ioc-in-logs"
55618+
],
55619+
"Reliability": []
55620+
},
5561355621
"session_types": false,
5561455622
"needs_cleanup": false,
5561555623
"actions": []
@@ -55634,14 +55642,22 @@
5563455642
"autofilter_ports": [],
5563555643
"autofilter_services": [],
5563655644
"targets": null,
55637-
"mod_time": "2022-01-23 15:28:32 +0000",
55645+
"mod_time": "2025-05-13 19:36:21 +0000",
5563855646
"path": "/modules/auxiliary/spoof/cisco/cdp.rb",
5563955647
"is_install_path": true,
5564055648
"ref_name": "spoof/cisco/cdp",
5564155649
"check": false,
5564255650
"post_auth": false,
5564355651
"default_credential": false,
55644-
"notes": {},
55652+
"notes": {
55653+
"Stability": [
55654+
"os-resource-loss"
55655+
],
55656+
"SideEffects": [
55657+
"ioc-in-logs"
55658+
],
55659+
"Reliability": []
55660+
},
5564555661
"session_types": false,
5564655662
"needs_cleanup": false,
5564755663
"actions": [
@@ -55669,14 +55685,22 @@
5566955685
"autofilter_ports": [],
5567055686
"autofilter_services": [],
5567155687
"targets": null,
55672-
"mod_time": "2020-05-12 22:15:21 +0000",
55688+
"mod_time": "2025-05-13 19:36:21 +0000",
5567355689
"path": "/modules/auxiliary/spoof/cisco/dtp.rb",
5567455690
"is_install_path": true,
5567555691
"ref_name": "spoof/cisco/dtp",
5567655692
"check": false,
5567755693
"post_auth": false,
5567855694
"default_credential": false,
55679-
"notes": {},
55695+
"notes": {
55696+
"Stability": [
55697+
"os-resource-loss"
55698+
],
55699+
"SideEffects": [
55700+
"ioc-in-logs"
55701+
],
55702+
"Reliability": []
55703+
},
5568055704
"session_types": false,
5568155705
"needs_cleanup": false,
5568255706
"actions": [
@@ -55698,7 +55722,7 @@
5569855722
5569955723
"Cedric Blancher <[email protected]>"
5570055724
],
55701-
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit replaces the target\n domains nameserver entries in a vulnerable DNS cache server. This attack works\n by sending random hostname queries to the target DNS server coupled with spoofed\n replies to those queries from the authoritative nameservers for that domain.\n Eventually, a guessed ID will match, the spoofed packet will get accepted, and\n the nameserver entries for the target domain will be replaced by the server\n specified in the NEWDNS option of this exploit.",
55725+
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit replaces the target\n domains nameserver entries in a vulnerable DNS cache server. This attack works\n by sending random hostname queries to the target DNS server coupled with spoofed\n replies to those queries from the authoritative nameservers for that domain.\n Eventually, a guessed ID will match, the spoofed packet will get accepted, and\n the nameserver entries for the target domain will be replaced by the server\n specified in the NEWDNS option of this exploit.",
5570255726
"references": [
5570355727
"CVE-2008-1447",
5570455728
"OSVDB-46776",
@@ -55711,14 +55735,22 @@
5571155735
"autofilter_ports": [],
5571255736
"autofilter_services": [],
5571355737
"targets": null,
55714-
"mod_time": "2025-02-28 09:35:28 +0000",
55738+
"mod_time": "2025-05-13 19:36:21 +0000",
5571555739
"path": "/modules/auxiliary/spoof/dns/bailiwicked_domain.rb",
5571655740
"is_install_path": true,
5571755741
"ref_name": "spoof/dns/bailiwicked_domain",
5571855742
"check": true,
5571955743
"post_auth": false,
5572055744
"default_credential": false,
55721-
"notes": {},
55745+
"notes": {
55746+
"Stability": [
55747+
"service-resource-loss"
55748+
],
55749+
"SideEffects": [
55750+
"ioc-in-logs"
55751+
],
55752+
"Reliability": []
55753+
},
5572255754
"session_types": false,
5572355755
"needs_cleanup": false,
5572455756
"actions": []
@@ -55734,7 +55766,7 @@
5573455766
"I)ruid <[email protected]>",
5573555767
5573655768
],
55737-
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit caches a single\n malicious host entry into the target nameserver by sending random hostname\n queries to the target DNS server coupled with spoofed replies to those\n queries from the authoritative nameservers for that domain. Eventually, a\n guessed ID will match, the spoofed packet will get accepted, and due to the\n additional hostname entry being within bailiwick constraints of the original\n request the malicious host entry will get cached.",
55769+
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit caches a single\n malicious host entry into the target nameserver by sending random hostname\n queries to the target DNS server coupled with spoofed replies to those\n queries from the authoritative nameservers for that domain. Eventually, a\n guessed ID will match, the spoofed packet will get accepted, and due to the\n additional hostname entry being within bailiwick constraints of the original\n request the malicious host entry will get cached.",
5573855770
"references": [
5573955771
"CVE-2008-1447",
5574055772
"OSVDB-46776",
@@ -55747,14 +55779,22 @@
5574755779
"autofilter_ports": [],
5574855780
"autofilter_services": [],
5574955781
"targets": null,
55750-
"mod_time": "2025-02-28 09:35:28 +0000",
55782+
"mod_time": "2025-05-13 19:36:21 +0000",
5575155783
"path": "/modules/auxiliary/spoof/dns/bailiwicked_host.rb",
5575255784
"is_install_path": true,
5575355785
"ref_name": "spoof/dns/bailiwicked_host",
5575455786
"check": true,
5575555787
"post_auth": false,
5575655788
"default_credential": false,
55757-
"notes": {},
55789+
"notes": {
55790+
"Stability": [
55791+
"service-resource-loss"
55792+
],
55793+
"SideEffects": [
55794+
"ioc-in-logs"
55795+
],
55796+
"Reliability": []
55797+
},
5575855798
"session_types": false,
5575955799
"needs_cleanup": false,
5576055800
"actions": []
@@ -55769,22 +55809,28 @@
5576955809
"author": [
5577055810
5577155811
],
55772-
"description": "This module can be used to determine differences\n in the cache entries between two DNS servers. This is\n primarily useful for detecting cache poisoning attacks,\n but can also be used to detect geo-location load balancing.",
55812+
"description": "This module can be used to determine differences\n in the cache entries between two DNS servers. This is\n primarily useful for detecting cache poisoning attacks,\n but can also be used to detect geo-location load balancing.",
5577355813
"references": [],
5577455814
"platform": "",
5577555815
"arch": "",
5577655816
"rport": null,
5577755817
"autofilter_ports": [],
5577855818
"autofilter_services": [],
5577955819
"targets": null,
55780-
"mod_time": "2020-10-02 17:38:06 +0000",
55820+
"mod_time": "2025-05-13 19:36:21 +0000",
5578155821
"path": "/modules/auxiliary/spoof/dns/compare_results.rb",
5578255822
"is_install_path": true,
5578355823
"ref_name": "spoof/dns/compare_results",
5578455824
"check": false,
5578555825
"post_auth": false,
5578655826
"default_credential": false,
55787-
"notes": {},
55827+
"notes": {
55828+
"Stability": [
55829+
"crash-safe"
55830+
],
55831+
"SideEffects": [],
55832+
"Reliability": []
55833+
},
5578855834
"session_types": false,
5578955835
"needs_cleanup": false,
5579055836
"actions": []
@@ -55811,7 +55857,7 @@
5581155857
"dns"
5581255858
],
5581355859
"targets": null,
55814-
"mod_time": "2022-03-21 13:50:16 +0000",
55860+
"mod_time": "2025-05-13 19:36:21 +0000",
5581555861
"path": "/modules/auxiliary/spoof/dns/native_spoofer.rb",
5581655862
"is_install_path": true,
5581755863
"ref_name": "spoof/dns/native_spoofer",
@@ -55852,14 +55898,22 @@
5585255898
"autofilter_ports": [],
5585355899
"autofilter_services": [],
5585455900
"targets": null,
55855-
"mod_time": "2022-03-09 13:47:14 +0000",
55901+
"mod_time": "2025-05-13 19:36:21 +0000",
5585655902
"path": "/modules/auxiliary/spoof/llmnr/llmnr_response.rb",
5585755903
"is_install_path": true,
5585855904
"ref_name": "spoof/llmnr/llmnr_response",
5585955905
"check": false,
5586055906
"post_auth": false,
5586155907
"default_credential": false,
55862-
"notes": {},
55908+
"notes": {
55909+
"Stability": [
55910+
"os-resource-loss"
55911+
],
55912+
"SideEffects": [
55913+
"ioc-in-logs"
55914+
],
55915+
"Reliability": []
55916+
},
5586355917
"session_types": false,
5586455918
"needs_cleanup": false,
5586555919
"actions": [
@@ -55891,14 +55945,22 @@
5589155945
"autofilter_ports": [],
5589255946
"autofilter_services": [],
5589355947
"targets": null,
55894-
"mod_time": "2022-03-09 13:47:14 +0000",
55948+
"mod_time": "2025-05-13 19:36:21 +0000",
5589555949
"path": "/modules/auxiliary/spoof/mdns/mdns_response.rb",
5589655950
"is_install_path": true,
5589755951
"ref_name": "spoof/mdns/mdns_response",
5589855952
"check": false,
5589955953
"post_auth": false,
5590055954
"default_credential": false,
55901-
"notes": {},
55955+
"notes": {
55956+
"Stability": [
55957+
"service-resource-loss"
55958+
],
55959+
"SideEffects": [
55960+
"ioc-in-logs"
55961+
],
55962+
"Reliability": []
55963+
},
5590255964
"session_types": false,
5590355965
"needs_cleanup": false,
5590455966
"actions": [
@@ -55918,7 +55980,7 @@
5591855980
"author": [
5591955981
"Tim Medin <[email protected]>"
5592055982
],
55921-
"description": "This module forges NetBIOS Name Service (NBNS) responses. It will listen for NBNS requests\n sent to the local subnet's broadcast address and spoof a response, redirecting the querying\n machine to an IP of the attacker's choosing. Combined with auxiliary/server/capture/smb or\n auxiliary/server/capture/http_ntlm it is a highly effective means of collecting crackable hashes on\n common networks.\n\n This module must be run as root and will bind to udp/137 on all interfaces.",
55983+
"description": "This module forges NetBIOS Name Service (NBNS) responses. It will listen for NBNS requests\n sent to the local subnet's broadcast address and spoof a response, redirecting the querying\n machine to an IP of the attacker's choosing. Combined with auxiliary/server/capture/smb or\n auxiliary/server/capture/http_ntlm it is a highly effective means of collecting crackable\n hashes on common networks.\n\n This module must be run as root and will bind to udp/137 on all interfaces.",
5592255984
"references": [
5592355985
"URL-http://www.packetstan.com/2011/03/nbns-spoofing-on-your-way-to-world.html"
5592455986
],
@@ -55928,14 +55990,22 @@
5592855990
"autofilter_ports": [],
5592955991
"autofilter_services": [],
5593055992
"targets": null,
55931-
"mod_time": "2024-01-07 15:02:53 +0000",
55993+
"mod_time": "2025-05-13 19:36:21 +0000",
5593255994
"path": "/modules/auxiliary/spoof/nbns/nbns_response.rb",
5593355995
"is_install_path": true,
5593455996
"ref_name": "spoof/nbns/nbns_response",
5593555997
"check": false,
5593655998
"post_auth": false,
5593755999
"default_credential": false,
55938-
"notes": {},
56000+
"notes": {
56001+
"Stability": [
56002+
"service-resource-loss"
56003+
],
56004+
"SideEffects": [
56005+
"ioc-in-logs"
56006+
],
56007+
"Reliability": []
56008+
},
5593956009
"session_types": false,
5594056010
"needs_cleanup": false,
5594156011
"actions": [
@@ -55955,22 +56025,30 @@
5595556025
"author": [
5595656026
"amaloteaux <[email protected]>"
5595756027
],
55958-
"description": "Replay a pcap capture file",
56028+
"description": "Replay a packet capture (PCAP) file.",
5595956029
"references": [],
5596056030
"platform": "",
5596156031
"arch": "",
5596256032
"rport": null,
5596356033
"autofilter_ports": [],
5596456034
"autofilter_services": [],
5596556035
"targets": null,
55966-
"mod_time": "2017-07-24 06:26:21 +0000",
56036+
"mod_time": "2025-05-13 19:36:21 +0000",
5596756037
"path": "/modules/auxiliary/spoof/replay/pcap_replay.rb",
5596856038
"is_install_path": true,
5596956039
"ref_name": "spoof/replay/pcap_replay",
5597056040
"check": false,
5597156041
"post_auth": false,
5597256042
"default_credential": false,
55973-
"notes": {},
56043+
"notes": {
56044+
"Stability": [
56045+
"service-resource-loss"
56046+
],
56047+
"SideEffects": [
56048+
"ioc-in-logs"
56049+
],
56050+
"Reliability": []
56051+
},
5597456052
"session_types": false,
5597556053
"needs_cleanup": false,
5597656054
"actions": []

0 commit comments

Comments
 (0)