Land #3448, ident =! indent
commit
1ab379a0fe
|
@ -358,7 +358,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
#CREATE TABLE TO STORE SQL SERVER DATA LOOT
|
||||
sql_data_tbl = Rex::Ui::Text::Table.new(
|
||||
'Header' => 'SQL Server Data',
|
||||
'Ident' => 1,
|
||||
'Indent' => 1,
|
||||
'Columns' => ['Server', 'Database', 'Schema', 'Table', 'Column', 'Data Type', 'Sample Data', 'Row Count']
|
||||
)
|
||||
|
||||
|
|
|
@ -153,7 +153,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
users_table = Rex::Ui::Text::Table.new(
|
||||
'Header' => 'Advantech WebAccess Users',
|
||||
'Ident' => 1,
|
||||
'Indent' => 1,
|
||||
'Columns' => ['Username', 'Encrypted Password', 'Key', 'Recovered password', 'Origin']
|
||||
)
|
||||
|
||||
|
|
|
@ -164,7 +164,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
users_table = Rex::Ui::Text::Table.new(
|
||||
'Header' => 'vBulletin Users',
|
||||
'Ident' => 1,
|
||||
'Indent' => 1,
|
||||
'Columns' => ['Username', 'Password Hash', 'Salt']
|
||||
)
|
||||
|
||||
|
|
|
@ -112,7 +112,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# Create loot table to store configuration information from crawled database server links
|
||||
linked_server_table = Rex::Ui::Text::Table.new(
|
||||
'Header' => 'Linked Server Table',
|
||||
'Ident' => 1,
|
||||
'Indent' => 1,
|
||||
'Columns' => ['db_server', 'db_version', 'db_os', 'link_server', 'link_user', 'link_privilege', 'link_version', 'link_os','link_state']
|
||||
)
|
||||
save_loot = ""
|
||||
|
|
Loading…
Reference in New Issue