Land #4334, @todb-r7's cosmetic fixes
commit
4a47f0fd28
|
@ -125,7 +125,7 @@ class Metasploit3 < Msf::Post
|
|||
print_good("Account Found:")
|
||||
print_status(" Type: #{type}")
|
||||
print_status(" User Display Name: #{displayname}")
|
||||
print_status(" User E-mail Address: #{email}")
|
||||
print_status(" User Email Address: #{email}")
|
||||
|
||||
if type == "POP3"
|
||||
pop3_pw = get_valdata(k, 'POP3 Password')
|
||||
|
|
|
@ -16,8 +16,11 @@ class Metasploit3 < Msf::Post
|
|||
super(update_info(info,
|
||||
'Name' => 'Windows Gather Outlook Email Messages',
|
||||
'Description' => %q{
|
||||
This module allows you to read and search email messages from the local Outlook installation using powershell. Please note that this module is manipulating the victims keyboard/mouse.
|
||||
If a victim is behind the target system, he might notice the activities of this module. Tested on Windows 8.1 x64 with Office 2013.
|
||||
This module allows reading and searching email messages from the local
|
||||
Outlook installation using PowerShell. Please note that this module is
|
||||
manipulating the victims keyboard/mouse. If a victim is active on the target
|
||||
system, he may notice the activities of this module. Tested on Windows 8.1
|
||||
x64 with Office 2013.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'Wesley Neelen <security[at]forsec.nl>' ],
|
||||
|
@ -128,9 +131,9 @@ class Metasploit3 < Msf::Post
|
|||
|
||||
# Powershell installed check
|
||||
if have_powershell?
|
||||
print_good("Powershell is installed.")
|
||||
print_good("PowerShell is installed.")
|
||||
else
|
||||
fail_with(Failure::Unknown, "Powershell is not installed")
|
||||
fail_with(Failure::Unknown, "PowerShell is not installed")
|
||||
end
|
||||
|
||||
# Check whether target system is locked
|
||||
|
|
Loading…
Reference in New Issue