spaces/tabs cleanup
git-svn-id: file:///home/svn/framework3/trunk@14115 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
47cb10c70b
commit
27c41e41f7
|
@ -19,21 +19,27 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'John the Ripper Linux Password Cracker',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
'Name' => 'John the Ripper Linux Password Cracker',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %Q{
|
||||
This module uses John the Ripper to identify weak passwords that have been
|
||||
aquired from unsahdowed passwd files from Unix systems. The module will noly crack
|
||||
MD5 and DES implementations by default. Set Crypt to true to also try to crack
|
||||
Blowfish and SHA implementations. Warning: This is much slower.
|
||||
aquired from unsahdowed passwd files from Unix systems. The module will noly crack
|
||||
MD5 and DES implementations by default. Set Crypt to true to also try to crack
|
||||
Blowfish and SHA implementations. Warning: This is much slower.
|
||||
},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]gmail.com>',
|
||||
'hdm'
|
||||
] ,
|
||||
'License' => MSF_LICENSE # JtR itself is GPLv2, but this wrapper is MSF (BSD)
|
||||
'Author' =>
|
||||
[
|
||||
'TheLightCosine <thelightcosine[at]gmail.com>',
|
||||
'hdm'
|
||||
] ,
|
||||
'License' => MSF_LICENSE # JtR itself is GPLv2, but this wrapper is MSF (BSD)
|
||||
)
|
||||
|
||||
register_options([OptBool.new('Crypt',[false, 'Try crypt() format hashes(Very Slow)', false])])
|
||||
register_options(
|
||||
[
|
||||
OptBool.new('Crypt',[false, 'Try crypt() format hashes(Very Slow)', false])
|
||||
]
|
||||
)
|
||||
|
||||
end
|
||||
|
||||
|
@ -114,10 +120,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
:pass => passwd
|
||||
)
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
|
||||
end
|
||||
|
||||
def build_seed
|
||||
|
@ -143,7 +147,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
# Seed the wordlist with usernames, passwords, and hostnames
|
||||
|
||||
|
||||
myworkspace.hosts.find(:all).each {|o| seed << john_expand_word( o.name ) if o.name }
|
||||
myworkspace.creds.each do |o|
|
||||
seed << john_expand_word( o.user ) if o.user
|
||||
|
@ -153,7 +156,6 @@ class Metasploit3 < Msf::Auxiliary
|
|||
# Grab any known passwords out of the john.pot file
|
||||
john_cracked_passwords.values {|v| seed << v }
|
||||
|
||||
|
||||
#Grab the default John Wordlist
|
||||
john = File.open(john_wordlist_path, "r")
|
||||
john.each_line{|line| seed << line.chomp}
|
||||
|
@ -169,7 +171,4 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
end
|
||||
|
||||
|
||||
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue