From 370f0f4e1323a28017bdc374c7b7d2c72df36154 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Tue, 27 Aug 2024 16:33:43 -0500 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 50 +++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index b6a87a1a67d8..b43bd5120307 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -256708,6 +256708,56 @@ ] }, + "post_multi/gather/electerm": { + "name": "Gather electerm Passwords", + "fullname": "post/multi/gather/electerm", + "aliases": [ + + ], + "rank": 300, + "disclosure_date": null, + "type": "post", + "author": [ + "Kali-Team " + ], + "description": "This module will determine if electerm is installed on the target system and, if it is, it will try to\n dump all saved session information from the target. The passwords for these saved sessions will then be decrypted\n where possible.", + "references": [ + "URL-https://blog.kali-team.cn/metasploit-electerm-6854f3d868eb45eab6951acc463a910d" + ], + "platform": "Linux,OSX,Unix,Windows", + "arch": "", + "rport": null, + "autofilter_ports": null, + "autofilter_services": null, + "targets": null, + "mod_time": "2024-08-22 22:28:01 +0000", + "path": "/modules/post/multi/gather/electerm.rb", + "is_install_path": true, + "ref_name": "multi/gather/electerm", + "check": false, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + + ], + "Reliability": [ + + ], + "SideEffects": [ + + ] + }, + "session_types": [ + "meterpreter", + "shell", + "powershell" + ], + "needs_cleanup": null, + "actions": [ + + ] + }, "post_multi/gather/enum_hexchat": { "name": "Linux Gather HexChat/XChat Enumeration", "fullname": "post/multi/gather/enum_hexchat",