Showing 15,831 of 21,886 total issues
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'SIP Invite Spoof',
'Description' => %q{
This module will create a fake SIP invite request making the targeted device ring
Method enum_users
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def enum_users(os)
users = []
path4users = ""
sysdrv = @client.sys.config.getenv('SystemDrive')
Method dumphash
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def dumphash(session)
path = File.join( Msf::Config.data_directory, "exploits", "powershell" )
print_status("Running PowerDump to extract Username and Password Hashes...")
Method lock
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def lock(phone_name)
res = send_request_cgi({
'method' => 'GET',
'uri' => '/IPSPCFG/user/Default.aspx',
'headers' => {
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'Authentication Capture: SMTP',
'Description' => %q{
This module provides a fake SMTP service that
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Cross Platform Webkit File Dropper',
'Description' => %q{
This module exploits a XSLT vulnerability in Webkit to drop ASCII or UTF-8
Method on_client_command_list
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def on_client_command_list(c,arg)
if(not @state[c][:auth])
c.put "500 Access denied\r\n"
return
Method mssql_send_ntlm_challenge
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def mssql_send_ntlm_challenge(c, info)
win_domain = Rex::Text.to_unicode(@domain_name.upcase)
win_name = Rex::Text.to_unicode(@domain_name.upcase)
dns_domain = Rex::Text.to_unicode(@domain_name.downcase)
dns_name = Rex::Text.to_unicode(@domain_name.downcase)
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'WPAD.dat File Server',
'Description' => %q{
This module generates a valid wpad.dat file for WPAD mitm
Method report_credential_core
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def report_credential_core(cred_opts={})
# Set up the has for our Origin service
origin_service_data = {
address: rhost,
port: rport,
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Zabbix toggle_ids SQL Injection',
'Description' => %q{
This module will exploit a SQL injection in Zabbix 3.0.3 and
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => "ColdFusion 'password.properties' Hash Extraction",
'Description' => %q{
This module uses a directory traversal vulnerability to extract information
Method trigger_ldap_request
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def trigger_ldap_request
ldap_trigger_page = '/userpost/xerox.set'
ldap_trigger_vars = {
'nameSchema'=>'givenName',
'emailSchema'=>'mail',
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Network Shutdown Module sort_values Credential Dumper',
'Description' => %q{
This module will extract user credentials from Network Shutdown Module
Method get_sqli_object
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def get_sqli_object
create_sqli(dbms: MySQLi::Common, opts: { hex_encode_strings: true }) do |payload|
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri('/wp-admin/admin-ajax.php'),
Method packages
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def packages
res = send_req('cgi-bin/bfenterprise/BESMirrorRequest.exe')
return unless res && res.code == 200
print_status('Packages')
Method try_login
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def try_login
print_status 'Trying to log in.'
res = send_request_cgi({
'method' => 'POST',
'keep_cookies' => true,
Method initialize
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Shodan Host Port',
Method run
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
# Unauthenticated requests to WebInterface endpoints should receive a response containing an 'anonymous' user session cookie
print_status('Fetching anonymous session cookie...')
res_anonymous = get_anon_session
Method run
has 27 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run
doctype = Rex::Text.rand_text_alpha(6)
element = Rex::Text.rand_text_alpha(6)
entity = Rex::Text.rand_text_alpha(6)