##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = ManualRanking

  include Msf::Exploit::Remote::Dialup

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name'	=> 'Test Dialup Exploit',
        'Description'	=> %q{
          This exploit connects to a system's modem over dialup and provides
          the user with a readout of the login banner.
        },
        'Author' => [
          'I)ruid',
        ],
        'Arch'	=> ARCH_TTY,
        'Platform'	=> ['unix'],
        'License'	=> MSF_LICENSE,
        'Payload' => {
          'Space' => 1000,
          'BadChars' => '',
          'DisableNops' => true,
        },
        'Targets' => [
          [ 'Automatic', {} ],
        ],
        'DefaultTarget' => 0
      )
    )
  end

  def autofilter
    false
  end

  def exploit
    connect_dialup
    handler
    disconnect_dialup
  end

end
