From b731291878d5a9e8311007730c10445b392427d3 Mon Sep 17 00:00:00 2001 From: Mario Ceballos Date: Sat, 5 Dec 2009 14:14:23 +0000 Subject: [PATCH] cleaned up name and description. git-svn-id: file:///home/svn/framework3/trunk@7713 4d416f70-5f16-0410-b530-b9f4589650da --- modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb index e031312d30..bdfe559f97 100644 --- a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb +++ b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb @@ -13,15 +13,15 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'Owning Windows server using Oracle database unpivileged user.', + 'Name' => 'Oracle SMB Relay Code Execution', 'Description' => %q{ - This module will help you to get Administrator access to OS using unprivileged - Oracle database user (you need only CONNECT and RESOURCE privileges) - To do this you must firstly run smb_sniffer of smb_relay module on your sever. + This module will help you to get Administrator access to OS using an unprivileged + Oracle database user (you need only CONNECT and RESOURCE privileges). + To do this you must firstly run smb_sniffer or smb_relay module on your sever. Then you must connect to Oracle database and run this module Ora_NTLM_stealer.rb which will connect to your SMB sever with credentials of Oracle RDBMS. - So if smb_relay is working you will get Administrators access to server which runs - Oracle of not than you can decrypt HALFLM hash. + So if smb_relay is working, you will Administrator access to server which runs + Oracle. If not than you can decrypt HALFLM hash. }, 'Author' => [ 'Sh2kerr ' ], 'License' => MSF_LICENSE,