Land #4786, cosmetic fixes from @hmoore-r7

For {axis,glassfish}_login.
bug/bundler_fix
William Vu 2015-02-18 03:56:13 -06:00
commit 10960310da
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743
2 changed files with 2 additions and 2 deletions

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'Apache Axis2 Brute Force Utility',
'Description' => %q{
This module attempts to login to an Apache Axis2 instance using
username and password combindations indicated by the USER_FILE,
username and password combinations indicated by the USER_FILE,
PASS_FILE, and USERPASS_FILE options. It has been verified to
work on at least versions 1.4.1 and 1.6.2.
},

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'GlassFish Brute Force Utility',
'Description' => %q{
This module attempts to login to GlassFish instance using username and password
combindations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options.
combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options.
It will also try to do an authentication bypass against older versions of GlassFish.
Note: by default, GlassFish 4.0 requires HTTPS, which means you must set the SSL option
to true, and SSLVersion to TLS1. It also needs Secure Admin to access the DAS remotely.