Fix comments

bug/bundler_fix
William Vu 2015-04-15 18:30:48 -05:00
parent 9bcc988266
commit 7a9167b235
1 changed files with 6 additions and 6 deletions

View File

@ -27,8 +27,8 @@ class Metasploit3 < Msf::Auxiliary
'SecureState R&D Team',
'sinn3r',
'Brandon Knight',
'Pete (Bokojan) Arzamendi - Outlook 2013 updates',
'Nate Power - HTTP timing option'
'Pete (Bokojan) Arzamendi', # Outlook 2013 updates
'Nate Power' # HTTP timing option
],
'License' => MSF_LICENSE,
'Actions' =>
@ -193,8 +193,8 @@ class Metasploit3 < Msf::Auxiliary
return :abort
end
if action.name == "OWA_2013"
#Check for a response code to make sure login was valid. Changes from 2010 to 2013.
#Check if the password needs to be changed.
# Check for a response code to make sure login was valid. Changes from 2010 to 2013.
# Check if the password needs to be changed.
if res.headers['location'] =~ /expiredpassword/
print_good("#{msg} SUCCESSFUL LOGIN. #{elapsed_time} '#{user}' : '#{pass}': NOTE password change required")
report_hash = {
@ -210,7 +210,7 @@ class Metasploit3 < Msf::Auxiliary
return :next_user
end
#No password change required moving on.
# No password change required moving on.
unless location = res.headers['location']
print_error("#{msg} No HTTP redirect. This is not OWA 2013, aborting.")
return :abort
@ -219,7 +219,7 @@ class Metasploit3 < Msf::Auxiliary
if reason == nil
headers['Cookie'] = 'PBack=0;' << res.get_cookies
else
#Login didn't work. no point on going on.
# Login didn't work. no point on going on.
vprint_error("#{msg} FAILED LOGIN. #{elapsed_time} '#{user}' : '#{pass}' (HTTP redirect with reason #{reason})")
return :Skip_pass
end