Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Dec 19, 2024
1 parent 51bbc76 commit b7bb750
Showing 1 changed file with 52 additions and 0 deletions.
52 changes: 52 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -50386,6 +50386,58 @@

]
},
"auxiliary_scanner/ntp/timeroast": {
"name": "NTP Timeroast",
"fullname": "auxiliary/scanner/ntp/timeroast",
"aliases": [

],
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"Tom Tervoort",
"Spencer McIntyre"
],
"description": "Windows authenticates NTP requests by calculating the message digest using the NT hash followed by the first\n 48 bytes of the NTP message (all fields preceding the key ID). An attacker can abuse this to recover hashes\n that can be cracked offline for machine and trust accounts. The attacker must know the accounts RID, but\n because RIDs are sequential, they can easily be enumerated.",
"references": [
"URL-https://github.com/SecuraBV/Timeroast/",
"URL-https://www.secura.com/uploads/whitepapers/Secura-WP-Timeroasting-v3.pdf"
],
"platform": "",
"arch": "",
"rport": 123,
"autofilter_ports": [

],
"autofilter_services": [

],
"targets": null,
"mod_time": "2024-12-19 17:12:39 +0000",
"path": "/modules/auxiliary/scanner/ntp/timeroast.rb",
"is_install_path": true,
"ref_name": "scanner/ntp/timeroast",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [

],
"Reliability": [

],
"SideEffects": [

]
},
"session_types": false,
"needs_cleanup": false,
"actions": [

]
},
"auxiliary_scanner/openvas/openvas_gsad_login": {
"name": "OpenVAS gsad Web Interface Login Utility",
"fullname": "auxiliary/scanner/openvas/openvas_gsad_login",
Expand Down

0 comments on commit b7bb750

Please sign in to comment.