diff --git a/modules/auxiliary/scanner/http/owa_login.rb b/modules/auxiliary/scanner/http/owa_login.rb index 0d7b43d699..5e385474b3 100644 --- a/modules/auxiliary/scanner/http/owa_login.rb +++ b/modules/auxiliary/scanner/http/owa_login.rb @@ -27,8 +27,8 @@ class Metasploit3 < Msf::Auxiliary 'SecureState R&D Team', 'sinn3r', 'Brandon Knight', - 'Pete (Bokojan) Arzamendi - Outlook 2013 updates', - 'Nate Power - HTTP timing option' + 'Pete (Bokojan) Arzamendi', # Outlook 2013 updates + 'Nate Power' # HTTP timing option ], 'License' => MSF_LICENSE, 'Actions' => @@ -193,8 +193,8 @@ class Metasploit3 < Msf::Auxiliary return :abort end if action.name == "OWA_2013" - #Check for a response code to make sure login was valid. Changes from 2010 to 2013. - #Check if the password needs to be changed. + # Check for a response code to make sure login was valid. Changes from 2010 to 2013. + # Check if the password needs to be changed. if res.headers['location'] =~ /expiredpassword/ print_good("#{msg} SUCCESSFUL LOGIN. #{elapsed_time} '#{user}' : '#{pass}': NOTE password change required") report_hash = { @@ -210,7 +210,7 @@ class Metasploit3 < Msf::Auxiliary return :next_user end - #No password change required moving on. + # No password change required moving on. unless location = res.headers['location'] print_error("#{msg} No HTTP redirect. This is not OWA 2013, aborting.") return :abort @@ -219,7 +219,7 @@ class Metasploit3 < Msf::Auxiliary if reason == nil headers['Cookie'] = 'PBack=0;' << res.get_cookies else - #Login didn't work. no point on going on. + # Login didn't work. no point on going on. vprint_error("#{msg} FAILED LOGIN. #{elapsed_time} '#{user}' : '#{pass}' (HTTP redirect with reason #{reason})") return :Skip_pass end