diff --git a/modules/exploits/shell_shock_scanner/config.yaml b/modules/exploits/shell_shock_scanner/config.yaml index be4b5fc61..06b6c3ac9 100644 --- a/modules/exploits/shell_shock_scanner/config.yaml +++ b/modules/exploits/shell_shock_scanner/config.yaml @@ -10,6 +10,6 @@ beef: category: "Exploits" name: "Shell Shock Scanner (Reverse Shell)" description: "This module attempts to get a reverse shell on the specified web server, blindly, by requesting ~400 potentially vulnerable CGI scripts. Each CGI is requested with a shellshock payload in the 'Accept' HTTP header.
The list of CGI scripts was taken from Shocker." - authors: ["Stephane Chazelas", "mz", "bmantra", "bcoles"] + authors: ["Stephane Chazelas", "mz", "bmantra", "radoen", "bcoles"] target: working: ["ALL"] diff --git a/modules/exploits/shell_shocked/config.yaml b/modules/exploits/shell_shocked/config.yaml index df3edd907..18cd7c1c5 100644 --- a/modules/exploits/shell_shocked/config.yaml +++ b/modules/exploits/shell_shocked/config.yaml @@ -10,5 +10,6 @@ beef: category: "Exploits" name: "Shell Shock" description: "Attempt to use vulnerability CVE-2014-627 to execute arbitrary code. The default command attempts to get a reverse shell.
Note: Set the LHOST and LPORT." + authors: ["Stephane Chazelas", "mz", "radoen", "bcoles"] target: working: ["All"]