Seplling
git-svn-id: file:///home/svn/framework3/trunk@14166 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
f6cc9eade7
commit
e4d540e031
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'Description' => %Q{
|
'Description' => %Q{
|
||||||
This module uses John the Ripper to identify weak passwords that have been
|
This module uses John the Ripper to identify weak passwords that have been
|
||||||
acquired from unshadowed passwd files from Unix systems. The module will noly crack
|
acquired from unshadowed passwd files from Unix systems. The module will only crack
|
||||||
MD5 and DES implementations by default. Set Crypt to true to also try to crack
|
MD5 and DES implementations by default. Set Crypt to true to also try to crack
|
||||||
Blowfish and SHA implementations. Warning: This is much slower.
|
Blowfish and SHA implementations. Warning: This is much slower.
|
||||||
},
|
},
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'Description' => %Q{
|
'Description' => %Q{
|
||||||
This module uses John the Ripper to identify weak passwords that have been
|
This module uses John the Ripper to identify weak passwords that have been
|
||||||
acquired from the mssql_hashdump module. Passwords that have been successfully
|
acquired from the mssql_hashdump module. Passwords that have been successfully
|
||||||
cracked are then saved as propper credentials
|
cracked are then saved as proper credentials
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'Description' => %Q{
|
'Description' => %Q{
|
||||||
This module uses John the Ripper to identify weak passwords that have been
|
This module uses John the Ripper to identify weak passwords that have been
|
||||||
acquired from the mysql_hashdump module. Passwords that have been successfully
|
acquired from the mysql_hashdump module. Passwords that have been successfully
|
||||||
cracked are then saved as propper credentials
|
cracked are then saved as proper credentials
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -24,7 +24,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'Description' => %Q{
|
'Description' => %Q{
|
||||||
This module uses John the Ripper to identify weak passwords that have been
|
This module uses John the Ripper to identify weak passwords that have been
|
||||||
acquired from the oracle_hashdump module. Passwords that have been successfully
|
acquired from the oracle_hashdump module. Passwords that have been successfully
|
||||||
cracked are then saved as propper credentials
|
cracked are then saved as proper credentials
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'Description' => %Q{
|
'Description' => %Q{
|
||||||
This module attempts to crack Postgres SQL md5 password hashes.
|
This module attempts to crack Postgres SQL md5 password hashes.
|
||||||
It creates hashes based on information saved in the MSF Database
|
It creates hashes based on information saved in the MSF Database
|
||||||
such as hostnames, usernames,passwords, and database schema information.
|
such as hostnames, usernames, passwords, and database schema information.
|
||||||
The user can also supply an additional external wordlist if they wish.
|
The user can also supply an additional external wordlist if they wish.
|
||||||
},
|
},
|
||||||
'Author' => ['TheLightCosine <thelightcosine[at]gmail.com>'],
|
'Author' => ['TheLightCosine <thelightcosine[at]gmail.com>'],
|
||||||
|
|
Loading…
Reference in New Issue