diff --git a/modules/post/linux/gather/ecryptfs_creds.rb b/modules/post/linux/gather/ecryptfs_creds.rb index f9596a4739..a83b6eeca7 100644 --- a/modules/post/linux/gather/ecryptfs_creds.rb +++ b/modules/post/linux/gather/ecryptfs_creds.rb @@ -21,9 +21,9 @@ class Metasploit3 < Msf::Post super( update_info(info, 'Name' => 'Gather eCryptfs Metadata', 'Description' => %q{ - This module will grab the contents of user's .ecrypts directory on - the targeted machine. Grabbed "wrapped-passphrase" files can be - cracked with JtR to get "mount passphrases". + This module will collect the contents of all users' .ecrypts directories on + the targeted machine. Collected "wrapped-passphrase" files can be + cracked with John the Ripper (JtR) to recover "mount passphrases". }, 'License' => MSF_LICENSE, 'Author' => ['Dhiru Kholia '], diff --git a/modules/post/multi/gather/gpg_creds.rb b/modules/post/multi/gather/gpg_creds.rb index 87c038e36b..6d942bfd90 100644 --- a/modules/post/multi/gather/gpg_creds.rb +++ b/modules/post/multi/gather/gpg_creds.rb @@ -21,8 +21,8 @@ class Metasploit3 < Msf::Post super( update_info(info, 'Name' => 'Multi Gather GnuPG Credentials Collection', 'Description' => %q{ - This module will collect the contents of user's .gnupg directory on the targeted - machine. Password protected secret keyrings can be cracked with JtR. + This module will collect the contents of all users' .gnupg directories on the targeted + machine. Password protected secret keyrings can be cracked with John the Ripper (JtR). }, 'License' => MSF_LICENSE, 'Author' => ['Dhiru Kholia '], diff --git a/modules/post/multi/gather/pgpass_creds.rb b/modules/post/multi/gather/pgpass_creds.rb index 321e02bf23..5f6b05a9d6 100644 --- a/modules/post/multi/gather/pgpass_creds.rb +++ b/modules/post/multi/gather/pgpass_creds.rb @@ -22,8 +22,8 @@ class Metasploit3 < Msf::Post super( update_info(info, 'Name' => 'Multi Gather pgpass Credentials', 'Description' => %q{ - This module will collect the contents of user's .pgpass or pgpass.conf and - parse them for credentials. + This module will collect the contents of all users' .pgpass or pgpass.conf + file and parse them for credentials. }, 'License' => MSF_LICENSE, 'Author' => ['Zach Grace '], diff --git a/modules/post/multi/gather/ssh_creds.rb b/modules/post/multi/gather/ssh_creds.rb index 15972aabc1..d0540d8b63 100644 --- a/modules/post/multi/gather/ssh_creds.rb +++ b/modules/post/multi/gather/ssh_creds.rb @@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post super( update_info(info, 'Name' => 'Multi Gather OpenSSH PKI Credentials Collection', 'Description' => %q{ - This module will collect the contents of user's .ssh directory on the targeted + This module will collect the contents of all users' .ssh directories on the targeted machine. Additionally, known_hosts and authorized_keys and any other files are also downloaded. This module is largely based on firefox_creds.rb. }, @@ -59,9 +59,9 @@ class Metasploit3 < Msf::Post sep = "/" files = cmd_exec("ls -1 #{path}").split(/\r\n|\r|\n/) end - path_array = path.split(sep) - path_array.pop - user = path_array.pop + path_array = path.split(sep) + path_array.pop + user = path_array.pop files.each do |file| next if [".", ".."].include?(file) data = read_file("#{path}#{sep}#{file}") @@ -79,7 +79,7 @@ class Metasploit3 < Msf::Post :host => session.session_host, :port => 22, :sname => 'ssh', - :user => user, + :user => user, :pass => loot_path, :source_type => "exploit", :type => 'ssh_key',