diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 9f3eee96c6cf..94441a6c0e80 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -9198,6 +9198,67 @@ ] }, + "auxiliary_admin/registry_security_descriptor": { + "name": "Windows Registry Security Descriptor Utility", + "fullname": "auxiliary/admin/registry_security_descriptor", + "aliases": [ + + ], + "rank": 300, + "disclosure_date": null, + "type": "auxiliary", + "author": [ + "Christophe De La Fuente" + ], + "description": "Read or write a Windows registry security descriptor remotely.\n\n In READ mode, the `FILE` option can be set to specify where the\n security descriptor should be written to.\n\n The following format is used:\n ```\n key: \n security_info: \n sd: \n ```\n\n In WRITE mode, the `FILE` option can be used to specify the information\n needed to write the security descriptor to the remote registry. The file must\n follow the same format as described above.", + "references": [ + + ], + "platform": "", + "arch": "", + "rport": 445, + "autofilter_ports": [ + 139, + 445 + ], + "autofilter_services": [ + "netbios-ssn", + "microsoft-ds" + ], + "targets": null, + "mod_time": "2024-05-13 12:01:54 +0000", + "path": "/modules/auxiliary/admin/registry_security_descriptor.rb", + "is_install_path": true, + "ref_name": "admin/registry_security_descriptor", + "check": false, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + + ], + "SideEffects": [ + "config-changes" + ] + }, + "session_types": [ + "smb" + ], + "needs_cleanup": false, + "actions": [ + { + "name": "READ", + "description": "Read a Windows registry security descriptor" + }, + { + "name": "WRITE", + "description": "Write a Windows registry security descriptor" + } + ] + }, "auxiliary_admin/sap/cve_2020_6207_solman_rce": { "name": "SAP Solution Manager remote unauthorized OS commands execution", "fullname": "auxiliary/admin/sap/cve_2020_6207_solman_rce",