git-svn-id: file:///home/svn/framework3/trunk@14166 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Matt Weeks 2011-11-05 15:43:28 +00:00
parent f6cc9eade7
commit e4d540e031
5 changed files with 5 additions and 5 deletions

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
'Version' => '$Revision$',
'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been
acquired from unshadowed passwd files from Unix systems. The module will noly crack
acquired from unshadowed passwd files from Unix systems. The module will only crack
MD5 and DES implementations by default. Set Crypt to true to also try to crack
Blowfish and SHA implementations. Warning: This is much slower.
},

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been
acquired from the mssql_hashdump module. Passwords that have been successfully
cracked are then saved as propper credentials
cracked are then saved as proper credentials
},
'Author' =>
[

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been
acquired from the mysql_hashdump module. Passwords that have been successfully
cracked are then saved as propper credentials
cracked are then saved as proper credentials
},
'Author' =>
[

View File

@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %Q{
This module uses John the Ripper to identify weak passwords that have been
acquired from the oracle_hashdump module. Passwords that have been successfully
cracked are then saved as propper credentials
cracked are then saved as proper credentials
},
'Author' =>
[

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
'Description' => %Q{
This module attempts to crack Postgres SQL md5 password hashes.
It creates hashes based on information saved in the MSF Database
such as hostnames, usernames,passwords, and database schema information.
such as hostnames, usernames, passwords, and database schema information.
The user can also supply an additional external wordlist if they wish.
},
'Author' => ['TheLightCosine <thelightcosine[at]gmail.com>'],