rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
33.76k stars 13.89k forks source link

159 broken links in module references #4141

Closed wchen-r7 closed 9 years ago

wchen-r7 commented 9 years ago

I used the modified tool in #4138 to check all the references, and I found 159 broken links. I manually verified them one by one with a browser, so I'm confident this list is accurate.

They're broken due to all kinds of reasons: some domains no longer exist, resources/links are removed (or moved to somewhere I don't know), typos, etc, etc.

  auxiliary/admin/cisco/vpn_3000_ftp_bypass                                Down         URL-http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml
  auxiliary/admin/hp/hp_data_protector_cmd                                 Down         URL-http://c4an-dl.blogspot.com/hp-data-protector-vuln.html
  auxiliary/admin/http/nexpose_xxe_file_read                               Down         URL-http://www.infigo.hr/in_focus/advisories/
  auxiliary/admin/postgres/postgres_readfile                               Down         URL-http://michaeldaw.org/sql-injection-cheat-sheet#postgres
  auxiliary/admin/postgres/postgres_sql                                    Down         URL-www.postgresql.org
  auxiliary/admin/smb/psexec_command                                       Down         URL-http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access
  auxiliary/admin/smb/psexec_ntdsgrab                                      Down         URL-http://www.accuvant.com/blog/2012/11/13/owning-computers-without-shell-access
  auxiliary/bnat/bnat_router                                               Down         URL-https://github.com/claudijd/BNAT-Suite
  auxiliary/bnat/bnat_scan                                                 Down         URL-https://github.com/claudijd/BNAT-Suite
  auxiliary/dos/cisco/ios_http_percentpercent                              Down         URL-http://www.cisco.com/warp/public/707/cisco-sa-20000514-ios-http-server.shtml
  auxiliary/dos/freebsd/nfsd/nfsd_mount                                    Down         URL-http://lists.immunitysec.com/pipermail/dailydave/2006-February/002982.html
  auxiliary/dos/http/hashcollision_dos                                     Down         URL-http://www.nruns.com/_downloads/advisory28122011.pdf
  auxiliary/dos/http/monkey_headers                                        Down         URL-http://bugs.monkey-project.com/ticket/182
  auxiliary/dos/windows/games/kaillera                                     Down         URL-http://kaillerahacks.blogspot.com/2011/07/kaillera-server-086-dos-vulnerability.html
  auxiliary/dos/windows/rdp/ms12_020_maxchannelids                         Down         URL-http://www.privatepaste.com/ffe875e04a
  auxiliary/scanner/http/cisco_ios_auth_bypass                             Down         URL-http://www.cisco.com/warp/public/707/cisco-sa-20010627-ios-http-level.shtml
  auxiliary/scanner/http/cisco_nac_manager_traversal                       Down         URL-http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml
  auxiliary/scanner/http/majordomo2_directory_traversal                    Down         URL-https://sitewat.ch/en/Advisory/View/1
  auxiliary/scanner/misc/poisonivy_control_scanner                         Down         URL-www.malware.lu/Pro/RAP002_APT1_Technical_backstage.1.0.pdf
  auxiliary/scanner/misc/zenworks_preboot_fileaccess                       Down         URL-http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html
  auxiliary/scanner/rogue/rogue_recv                                       Down         URL-http://www.metasploit.com/research/projects/rogue_network/
  auxiliary/scanner/rogue/rogue_send                                       Down         URL-http://www.metasploit.com/research/projects/rogue_network/
  auxiliary/scanner/scada/modbus_findunitid                                Down         URL-http://en.wikipedia.org/wiki/Modbus:TCP
  auxiliary/scanner/scada/modbusdetect                                     Down         URL-http://en.wikipedia.org/wiki/Modbus:TCP
  auxiliary/scanner/ssh/ssh_version                                        Down         URL-http://en.wikipedia.org/wiki/SecureShell
  auxiliary/sqli/oracle/dbms_cdc_ipublish                                  Down         URL-http://www.appsecinc.com/resources/alerts/oracle/2008-08.shtml
  auxiliary/sqli/oracle/dbms_cdc_publish                                   Down         URL-http://www.appsecinc.com/resources/alerts/oracle/2008-09.shtml
  auxiliary/sqli/oracle/lt_compressworkspace                               Down         URL-http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml
  auxiliary/sqli/oracle/lt_findricset_cursor                               Down         URL-http://rawlab.mindcreations.com/codes/exp/oracle/sys-lt-findricsetV2.sql
  auxiliary/sqli/oracle/lt_mergeworkspace                                  Down         URL-http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml
  auxiliary/sqli/oracle/lt_removeworkspace                                 Down         URL-http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml
  exploit/irix/lpd/tagprinter_exec                                         Down         URL-http://www.lsd-pl.net/code/IRIX/irx_lpsched.c
  exploit/linux/http/openfiler_networkcard_exec                            Down         URL-http://itsecuritysolutions.org/2012-09-06-Openfiler-v2.x-multiple-vulnerabilities/
  exploit/linux/http/peercast_url                                          Down         URL-http://www.infigo.hr/in_focus/INFIGO-2006-03-01
  exploit/linux/http/vcms_upload                                           Down         URL-http://bugs.v-cms.org/view.php?id=53
  exploit/linux/http/wanem_exec                                            Down         URL-http://itsecuritysolutions.org/2012-08-12-wanem-v2.3-multiple-vulnerabilities/
  exploit/linux/http/zen_load_balancer_exec                                Down         URL-http://itsecuritysolutions.org/2012-09-21-ZEN-Load-Balancer-v2.0-and-v3.0-rc1-multiple-vulnerabilities/
  exploit/linux/http/zenoss_showdaemonxmlconfig_exec                       Down         URL-http://itsecuritysolutions.org/2012-07-30-zenoss-3.2.1-multiple-security-vulnerabilities/
  exploit/linux/ids/snortbopre                                             Down         URL-http://xforce.iss.net/xforce/alerts/id/207
  exploit/linux/local/sock_sendpage                                        Down         URL-http://www.grsecurity.net/~spender/wunderbar_emporium2.tgz
  exploit/linux/misc/hp_data_protector_cmd_exec                            Down         URL-http://c4an-dl.blogspot.com/hp-data-protector-vuln.html
  exploit/linux/misc/ib_inet_connect                                       Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/linux/misc/ib_jrd8_create_database                               Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/linux/misc/ib_open_marker_file                                   Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/linux/misc/ib_pwd_db_aliased                                     Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/linux/misc/novell_edirectory_ncp_bof                             Down         URL-http://www.novell.com/support/kb/doc.php?id=3426981
  exploit/linux/mysql/mysql_yassl_getname                                  Down         URL-http://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.html
  exploit/linux/ssh/symantec_smg_ssh                                       Down         URL-https://www.sec-consult.com/files/20120829-0_Symantec_Mail_Gateway_Support_Backdoor.txt
  exploit/multi/browser/java_signed_applet                                 Down         URL-http://www.spikezilla-software.com/blog/?p=21
  exploit/multi/browser/mozilla_navigatorjava                              Down         URL-http://browserfun.blogspot.com/2006/07/mobb-28-mozilla-navigator-object.html
  exploit/multi/http/cuteflow_upload_exec                                  Down         URL-http://itsecuritysolutions.org/2012-07-01-CuteFlow-2.11.2-multiple-security-vulnerabilities/
  exploit/multi/http/extplorer_upload_exec                                 Down         URL-http://itsecuritysolutions.org/2012-12-31-eXtplorer-v2.1-authentication-bypass-vulnerability
  exploit/multi/http/op5_license                                           Down         URL-http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/
  exploit/multi/http/op5_license                                           Down         URL-http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf
  exploit/multi/http/op5_welcome                                           Down         URL-http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/
  exploit/multi/http/op5_welcome                                           Down         URL-http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf
  exploit/multi/http/rails_secret_deserialization                          Down         URL-https://charlie.bz/blog/rails-3.2.10-remote-code-execution
  exploit/multi/http/splunk_mappy_exec                                     Down         URL-http://www.sec-1.com/blog/wp-content/uploads/2011/12/splunkexploit.zip
  exploit/multi/http/splunk_mappy_exec                                     Down         URL-http://www.sec-1.com/blog/wp-content/uploads/2011/12/Attacking_Splunk_Release.pdf
  exploit/multi/http/struts_code_exec_classloader                          Down         URL-http://www.pwntester.com/blog/2014/04/24/struts2-0day-in-the-wild/
  exploit/multi/http/struts_code_exec_exception_delegator                  Down         URL-https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt
  exploit/multi/http/struts_dev_mode                                       Down         URL-http://www.pwntester.com/blog/2014/01/21/struts-2-devmode/
  exploit/multi/http/sun_jsws_dav_options                                  Down         URL-http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html
  exploit/multi/http/testlink_upload_exec                                  Down         URL-http://itsecuritysolutions.org/2012-08-13-TestLink-1.9.3-multiple-vulnerabilities/
  exploit/multi/http/vbseo_proc_deutf                                      Down         URL-http://www.vbseo.com/f5/vbseo-security-bulletin-all-supported-versions-patch-release-52783/
  exploit/multi/realserver/describe                                        Down         URL-http://lists.immunitysec.com/pipermail/dailydave/2003-August/000030.html
  exploit/multi/svn/svnserve_date                                          Down         URL-http://lists.netsys.com/pipermail/full-disclosure/2004-May/021737.html
  exploit/multi/wyse/hagent_untrusted_hsdata                               Down         URL-http://www.wyse.com/serviceandsupport/support/WSB09-01.zip
  exploit/multi/wyse/hagent_untrusted_hsdata                               Down         URL-http://www.wyse.com/serviceandsupport/Wyse%20Security%20Bulletin%20WSB09-01.pdf
  exploit/osx/arkeia/type77                                                Down         URL-http://lists.netsys.com/pipermail/full-disclosure/2005-February/031831.html
  exploit/solaris/sunrpc/sadmind_adm_build_path                            Down         URL-http://risesecurity.org/advisories/RISE-2008001.txt
  exploit/solaris/sunrpc/sadmind_exec                                      Down         URL-http://lists.insecure.org/lists/vulnwatch/2003/Jul-Sep/0115.html
  exploit/unix/ftp/proftpd_133c_backdoor                                   Down         URL-http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org
  exploit/unix/ssh/tectia_passwd_changereq                                 Down         URL-http://www.ssh.com/index.php/component/content/article/531.html
  exploit/unix/webapp/awstatstotals_multisort                              Down         URL-http://userwww.service.emory.edu/~ekenda2/EMORY-2008-01.txt
  exploit/unix/webapp/barracuda_img_exec                                   Down         URL-http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1
  exploit/unix/webapp/mybb_backdoor                                        Down         URL-http://blog.mybb.com/wp-content/uploads/2011/10/mybb_1604_patches.txt
  exploit/unix/webapp/openx_banner_edit                                    Down         URL-https://developer.openx.org/jira/browse/OX-5747
  exploit/unix/webapp/squirrelmail_pgp_plugin                              Down         URL-http://lists.immunitysec.com/pipermail/dailydave/2007-July/004456.html
  exploit/unix/webapp/zoneminder_packagecontrol_exec                       Down         URL-http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/
  exploit/windows/arkeia/type77                                            Down         URL-http://lists.netsys.com/pipermail/full-disclosure/2005-February/031831.html
  exploit/windows/brightstor/sql_agent                                     Down         URL-http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33239
  exploit/windows/brightstor/tape_engine                                   Down         URL-http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=101317
  exploit/windows/browser/adobe_flash_sps                                  Down         URL-http://www.abysssec.com/blog/2012/01/31/exploiting-cve-2011-2140-another-flash-player-vulnerability/
  exploit/windows/browser/adobe_jbig2decode                                Down         URL-http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html
  exploit/windows/browser/apple_quicktime_rtsp                             Down         URL-http://projects.info-pull.com/moab/MOAB-01-01-2007.html
  exploit/windows/browser/asus_net4switch_ipswcom                          Down         CVE-2012-4924 
  exploit/windows/browser/athocgov_completeinstallation                    Down         URL-http://www.athoc.com/products/IWSAlerts_overview.aspx
  exploit/windows/browser/java_docbase_bof                                 Down         URL-http://skypher.com/index.php/2010/10/13/issue-2-oracle-java-object-launchjnlp-docbase/
  exploit/windows/browser/mozilla_firefox_onreadystatechange               Down         URL-http://krash.in/ffn0day.txt
  exploit/windows/browser/ms06_001_wmf_setabortproc                        Down         URL-http://www.geocad.ru/new/site/Formats/Graphics/wmf/wmf.txt
  exploit/windows/browser/ms06_013_createtextrange                         Down         URL-http://www.shog9.com/crashIE.html
  exploit/windows/browser/ms06_057_webview_setslice                        Down         URL-http://browserfun.blogspot.com/2006/07/mobb-18-webviewfoldericon-setslice.html
  exploit/windows/browser/ms07_017_ani_loadimage_chunksize                 Down         URL-http://www.determina.com/security.research/vulnerabilities/ani-header.html
  exploit/windows/browser/ms10_042_helpctr_xss_cmd_exec                    Down         URL-http://lock.cmpxchg8b.com/b10a58b75029f79b5f93f4add3ddf992/ADVISORY
  exploit/windows/browser/ms11_003_ie_css_import                           Down         URL-http://xcon.xfocus.net/XCon2010_ChenXie_EN.pdf
  exploit/windows/browser/realplayer_qcp                                   Down         URL-http://lists.helixcommunity.org/pipermail/datatype-cvs/2011-April/015469.html
  exploit/windows/browser/wmi_admintools                                   Down         URL-http://xcon.xfocus.net/XCon2010_ChenXie_EN.pdf
  exploit/windows/email/ms07_017_ani_loadimage_chunksize                   Down         URL-http://www.determina.com/security_center/security_advisories/securityadvisory_0day_032907.asp
  exploit/windows/email/ms07_017_ani_loadimage_chunksize                   Down         URL-http://www.determina.com/security.research/vulnerabilities/ani-header.html
  exploit/windows/emc/networker_format_string                              Down         URL-http://blog.exodusintel.com/2012/08/29/when-wrapping-it-up-goes-wrong/
  exploit/windows/fileformat/activepdf_webgrabber                          Down         URL-http://www.activepdf.com/products/serverproducts/webgrabber/
  exploit/windows/fileformat/adobe_jbig2decode                             Down         URL-http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html
  exploit/windows/fileformat/etrust_pestscan                               Down         URL-http://www.my-etrust.com/Extern/RoadRunner/PestScan/scan.htm
  exploit/windows/fileformat/ms10_004_textbytesatom                        Down         URL-http://www.snoop-security.com/blog/index.php/2010/03/exploiting-ms10-004-ppt-viewer/
  exploit/windows/fileformat/ms11_021_xlb_bof                              Down         URL-http://www.abysssec.com/blog/2011/11/02/microsoft-excel-2007-sp2-buffer-overwrite-vulnerability-ba-exploit-ms11-021/
  exploit/windows/fileformat/ms12_027_mscomctl_bof                         Down         URL-http://abysssec.com/files/The_Arashi.pdf
  exploit/windows/fileformat/vlc_modplug_s3m                               Down         URL-https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt
  exploit/windows/fileformat/vlc_modplug_s3m                               Down         URL-http://hackipedia.org/File%20formats/Music/html/s3mformat.php
  exploit/windows/firewall/blackice_pam_icq                                Down         URL-http://xforce.iss.net/xforce/alerts/id/166
  exploit/windows/firewall/kerio_auth                                      Down         URL-http://www1.corest.com/common/showdoc.php?idx=314&idxseccion=10
  exploit/windows/ftp/3cdaemon_ftp_user                                    Down         URL-ftp://ftp.3com.com/pub/utilbin/win32/3cdv2r10.zip
  exploit/windows/ftp/aasync_list_reply                                    Down         URL-http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/
  exploit/windows/ftp/easyftp_cwd_fixret                                   Down         URL-http://code.google.com/p/easyftpsvr/
  exploit/windows/ftp/easyftp_cwd_fixret                                   Down         URL-https://tegosecurity.com/etc/return_overwrite/RCE_easy_ftp_server_1.7.0.2.zip
  exploit/windows/ftp/quickshare_traversal_write                           Down         URL-http://www.digital-echidna.org/2011/02/quickshare-file-share-1-2-1-directory-traversal-vulnerability/
  exploit/windows/ftp/quickshare_traversal_write                           Down         URL-http://www.quicksharehq.com/blog/quickshare-file-server-1-2-2-released.html
  exploit/windows/ftp/servu_mdtm                                           Down         URL-http://www.cnhonker.com/advisory/serv-u.mdtm.txt
  exploit/windows/ftp/vermillion_ftpd_port                                 Down         URL-http://www.global-evolution.info/news/files/vftpd/vftpd.txt
  exploit/windows/ftp/warftpd_165_pass                                     Down         URL-http://lists.insecure.org/lists/bugtraq/1998/Feb/0014.html
  exploit/windows/ftp/warftpd_165_user                                     Down         URL-http://lists.insecure.org/lists/bugtraq/1998/Feb/0014.html
  exploit/windows/http/apache_chunked                                      Down         URL-http://lists.insecure.org/lists/bugtraq/2002/Jun/0184.html
  exploit/windows/http/bea_weblogic_transfer_encoding                      Down         URL-http://support.bea.com/application_content/product_portlets/securityadvisories/2806.html
  exploit/windows/http/ca_igateway_debug                                   Down         URL-http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=33485
  exploit/windows/http/httpdx_handlepeer                                   Down         URL-http://www.pank4j.com/exploits/httpdxb0f.php
  exploit/windows/http/ia_webmail                                          Down         URL-http://www.k-otik.net/exploits/11.19.iawebmail.pl.php
  exploit/windows/http/mcafee_epolicy_source                               Down         URL-http://www.remote-exploit.org/advisories/mcafee-epo.pdf
  exploit/windows/http/peercast_url                                        Down         URL-http://www.infigo.hr/in_focus/INFIGO-2006-03-01
  exploit/windows/http/servu_session_cookie                                Down         URL-http://rangos.de/ServU-ADV.txt
  exploit/windows/isapi/w3who_query                                        Down         URL-http://www.exaprobe.com/labs/advisories/esa-2004-1206.html
  exploit/windows/local/ask                                                Down         URL-http://www.room362.com/blog/2012/1/3/uac-user-assisted-compromise.html
  exploit/windows/local/ms13_081_track_popup_menu                          Down         URL-http://endgame.com/news/microsoft-win32k-null-page-vulnerability-technical-analysis.html
  exploit/windows/local/ms_ndproxy                                         Down         URL-https://github.com/ShahinRamezany/Codes/blob/master/CVE-2013-5065/CVE-2013-5065.cpp
  exploit/windows/local/novell_client_nwfs                                 Down         URL-http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028543.html
  exploit/windows/misc/enterasys_netsight_syslog_bof                       Down         URL-https://cp-enterasys.kb.net/article.aspx?article=14206&p=1
  exploit/windows/misc/fb_isc_attach_database                              Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/windows/misc/fb_isc_create_database                              Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/windows/misc/fb_svc_attach                                       Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/windows/misc/ib_isc_attach_database                              Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/windows/misc/ib_isc_create_database                              Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/windows/misc/ib_svc_attach                                       Down         URL-http://www.risesecurity.org/advisories/RISE-2007002.txt
  exploit/windows/misc/poppeeper_date                                      Down         URL-http://www.krakowlabs.com/res/adv/KL0209ADV-poppeeper_date-bof.txt
  exploit/windows/misc/poppeeper_uidl                                      Down         URL-http://www.krakowlabs.com/res/adv/KL0209ADV-poppeeper_uidl-bof.txt
  exploit/windows/mysql/mysql_payload                                      Down         URL-http://dev.mysql.com/tech-resources/articles/securing_mysql_windows.html
  exploit/windows/novell/zenworks_preboot_op4c_bof                         Down         URL-http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html
  exploit/windows/novell/zenworks_preboot_op6c_bof                         Down         URL-http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html
  exploit/windows/oracle/tns_service_name                                  Down         URL-http://www.appsecinc.com/resources/alerts/oracle/02-0013.shtml
  exploit/windows/postgres/postgres_payload                                Down         URL-http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf
  exploit/windows/scada/procyon_core_server                                Down         URL-http://www.uscert.gov/control_systems/pdf/ICSA-11-216-01.pdf
  exploit/windows/scada/realwin_on_fcs_login                               Down         URL-http://www.dataconline.com/software/realwin.php
  exploit/windows/smb/ms04_007_killbill                                    Down         URL-http://www.phreedom.org/solar/exploits/msasn1-bitstring/
  exploit/windows/tftp/attftp_long_filename                                Down         URL-ftp://guest:guest@ftp.alliedtelesyn.co.uk/pub/utilities/at-tftpd19.zip
  exploit/windows/tftp/futuresoft_transfermode                             Down         URL-http://www.security.org.sg/vuln/tftp2000-1001.html
  post/windows/escalate/screen_unlock                                      Down         URL-http://www.storm.net.nz/projects/16
  post/windows/manage/vss_create                                           Down         URL-http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html
  post/windows/manage/vss_list                                             Down         URL-http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html
  post/windows/manage/vss_mount                                            Down         URL-http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html
  post/windows/manage/vss_set_storage                                      Down         URL-http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html
  post/windows/manage/vss_storage                                          Down         URL-http://pauldotcom.com/2011/11/safely-dumping-hashes-from-liv.html
kernelsmith commented 9 years ago

image

todb-r7 commented 9 years ago

How about a companion tool / method to wipe out the broken references? If after removing broken refs, you'll also want to alert when a module is left with no references. Just seems silly to ship modules with known broken refs.

wchen-r7 commented 9 years ago

How about a companion tool / method to wipe out the broken references?

Automatically removing is one option for sure. But it's actually kind of hard to say what you're supposed to do with a bad link unless you inspect it. Sometimes it's bad because there's a typo, in that case removing the link would be kind of an overkill... just fix the typo, you know. Sometimes maybe the website is being DDOS'd so the link is only temporarily bad. Sometimes it's could be redirected (our Rex API doesn't follow redirects). Because of these unpredictable conditions I decided not to go there. This is actually kind of hard.

kernelsmith commented 9 years ago

I wonder if we could use a site like isitdownorjustme or whatever it’s called to at least rule out the redirects, and maybe some types of DDoS

On Nov 5, 2014, at 7:10 PM, sinn3r notifications@github.com wrote:

How about a companion tool / method to wipe out the broken references?

Automatically removing is one option for sure. But it's actually kind of hard to say what you're supposed to do with a bad link unless you inspect it. Sometimes it's bad because there's a typo, in that case removing the link would be kind of an overkill... just fix the typo, you know. Sometimes maybe the website is being DDOS'd so the link is only temporarily bad. Sometimes it's could be redirected (our Rex API doesn't follow redirects). Because of these unpredictable conditions I decided not to go there.

— Reply to this email directly or view it on GitHub.

wchen-r7 commented 9 years ago

Yeah sometimes that's probably what you need to double check. Could be sort of an expensive one though (an extra web request to verify for every bad link). If I run the modified module_reference.rb tool for all module types (post, payload, aux, exploit, etc).... I think it takes about 3 to 4 hours.

todb-r7 commented 9 years ago

hmmm yeah i guess it is hard if you're interested in preserving the link for inspection. But, at the end of whatever validation pass you take, there should still be a @tabassassin style sort of mass fix. If a link is so unreliable as to be DDoS'ed more than a couple times, it probably shouldn't be a reference.

wchen-r7 commented 9 years ago

Yeah I'll have to think about this. I might have to create another issue and call it "automate broken reference repair" or something like that.

todb-r7 commented 9 years ago

Okeydokey.