From aca532b9949257940a4ac32cd8f6acc31eb32f24 Mon Sep 17 00:00:00 2001 From: David Maloney Date: Thu, 19 Jun 2014 15:07:33 -0500 Subject: [PATCH] making egypt happy it's a full time job --- modules/auxiliary/analyze/jtr_mssql_fast.rb | 1 + 1 file changed, 1 insertion(+) diff --git a/modules/auxiliary/analyze/jtr_mssql_fast.rb b/modules/auxiliary/analyze/jtr_mssql_fast.rb index c33fa8967f..2e938a5966 100644 --- a/modules/auxiliary/analyze/jtr_mssql_fast.rb +++ b/modules/auxiliary/analyze/jtr_mssql_fast.rb @@ -71,6 +71,7 @@ class Metasploit3 < Msf::Auxiliary print_status "Cracked Passwords this run:" cracker_instance.each_cracked_password do |password_line| next if password_line.blank? + # We look for the outpuy line containing username:password:core.id: for our actual password results next unless password_line =~ /\w+:\w+:\d+:/ username, password, core_id = password_line.split(':') create_cracked_credential( username: username, password: password, core_id: core_id)