replace old rex::ui::text::table refs

everywhere we called the class we have now rewritten it
to use the new namespace

MS-1875
bug/bundler_fix
David Maloney 2016-08-10 13:30:09 -05:00
parent 3f530f1896
commit eb73a6914d
No known key found for this signature in database
GPG Key ID: DEDBA9DC3A913DB2
140 changed files with 248 additions and 248 deletions

View File

@ -46,7 +46,7 @@ class ReadableText
# @param h [String] the string to display as the table heading.
# @return [String] the string form of the table.
def self.dump_exploit_targets(mod, indent = '', h = nil)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Header' => h,
'Columns' =>
@ -70,7 +70,7 @@ class ReadableText
# @param h [String] the string to display as the table heading.
# @return [String] the string form of the table.
def self.dump_exploit_target(mod, indent = '', h = nil)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Header' => h,
'Columns' =>
@ -92,7 +92,7 @@ class ReadableText
# @param h [String] the string to display as the table heading.
# @return [String] the string form of the table.
def self.dump_module_actions(mod, indent = '', h = nil)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Header' => h,
'Columns' =>
@ -116,7 +116,7 @@ class ReadableText
# @param h [String] the string to display as the table heading.
# @return [String] the string form of the table.
def self.dump_module_action(mod, indent = '', h = nil)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Header' => h,
'Columns' =>
@ -139,7 +139,7 @@ class ReadableText
# @param h [String] the string to display as the table heading.
# @return [String] the string form of the table.
def self.dump_compatible_payloads(exploit, indent = '', h = nil)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Header' => h,
'Columns' =>
@ -390,7 +390,7 @@ class ReadableText
# @param missing [Boolean] dump only empty required options.
# @return [String] the string form of the information.
def self.dump_options(mod, indent = '', missing = false)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Columns' =>
[
@ -419,7 +419,7 @@ class ReadableText
# @param indent [String] the indentation to use.
# @return [String] the string form of the information.
def self.dump_advanced_options(mod, indent = '')
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Columns' =>
[
@ -444,7 +444,7 @@ class ReadableText
# @param indent [String] the indentation to use.
# @return [String] the string form of the information.
def self.dump_evasion_options(mod, indent = '')
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent.length,
'Columns' =>
[
@ -490,7 +490,7 @@ class ReadableText
# @param col [Integer] the column width.
# @return [String] the formatted DataStore contents.
def self.dump_datastore(name, ds, indent = DefaultIndent, col = DefaultColumnWrap)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent,
'Header' => name,
'Columns' =>
@ -529,7 +529,7 @@ class ReadableText
columns << 'Information'
columns << 'Connection'
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent,
'Header' => "Active sessions",
'Columns' => columns)
@ -653,7 +653,7 @@ class ReadableText
columns += [ "URIPATH", "Start Time", "Handler opts" ]
end
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => indent,
'Header' => "Jobs",
'Columns' => columns

View File

@ -517,7 +517,7 @@ module Msf
# As an user, you shouldn't be using any of these paths anyway.
columns.delete('Path') if !datastore['VERBOSE']
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Exploits',
'Indent' => 1,
'Columns' => columns
@ -625,7 +625,7 @@ module Msf
# @return [void]
def show_exploit_list(ip, tag, current_exploit_list)
order = 1
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => '',
'Indent' => 1,
'Columns' => ['Order', 'IP', 'Exploit']

View File

@ -702,7 +702,7 @@ module Exploit::Remote::MSSQL
if(info[:rows] and not info[:rows].empty?)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => 1,
'Header' => "",
'Columns' => info[:colnames],

View File

@ -184,7 +184,7 @@ module Exploit::Remote::Postgres
# If resp is not actually a Connection::Result object, then return
# :error (but not an actual Exception, that's up to the caller.
# Otherwise, create a rowset using Rex::Ui::Text::Table (if there's
# Otherwise, create a rowset using Rex::Text::Table (if there's
# more than 0 rows) and return :complete.
def postgres_print_reply(resp=nil,sql=nil)
ip = datastore['RHOST']
@ -194,7 +194,7 @@ module Exploit::Remote::Postgres
if resp.rows and resp.fields
print_status "#{ip}:#{port} Rows Returned: #{resp.rows.size}" if verbose
if resp.rows.size > 0
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Header' => "Query Text: '#{sql}'",
'Columns' => resp.fields.map {|x| x.name}

View File

@ -164,7 +164,7 @@ module Exploit::Remote::WinRM
rows << row_data
end
columns.uniq!
response_data = Rex::Ui::Text::Table.new(
response_data = Rex::Text::Table.new(
'Header' => "#{datastore['WQL']} (#{rhost})",
'Indent' => 1,
'Columns' => columns

View File

@ -423,7 +423,7 @@ class Db
end
# If we got here, we're searching. Delete implies search
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
{
'Header' => "Hosts",
'Columns' => col_names,
@ -650,7 +650,7 @@ class Db
if col_search
col_names = col_search
end
tbl = Rex::Ui::Text::Table.new({
tbl = Rex::Text::Table.new({
'Header' => "Services",
'Columns' => ['host'] + col_names,
})
@ -1029,7 +1029,7 @@ class Db
'Columns' => cred_table_columns
}
tbl = Rex::Ui::Text::Table.new(tbl_opts)
tbl = Rex::Text::Table.new(tbl_opts)
::ActiveRecord::Base.connection_pool.with_connection {
query = Metasploit::Credential::Core.where( workspace_id: framework.db.workspace )
@ -1341,7 +1341,7 @@ class Db
end
# Now display them
csv_table = Rex::Ui::Text::Table.new(
csv_table = Rex::Text::Table.new(
'Header' => 'Notes',
'Indent' => 1,
'Columns' => ['Time', 'Host', 'Service', 'Port', 'Protocol', 'Type', 'Data']
@ -1501,7 +1501,7 @@ class Db
end
end
tbl = Rex::Ui::Text::Table.new({
tbl = Rex::Text::Table.new({
'Header' => "Loot",
'Columns' => [ 'host', 'service', 'type', 'name', 'content', 'info', 'path' ],
})

View File

@ -9,7 +9,7 @@ module Console
# Console table display wrapper that allows for stylized tables
#
###
class Table < Rex::Ui::Text::Table
class Table < Rex::Text::Table
#
# Default table styles.

View File

@ -88,7 +88,7 @@ class GPP
def self.create_tables(results, filetype, domain=nil, dc=nil)
tables = []
results.each do |result|
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Group Policy Credential Info',
'Indent' => 1,
'SortIndex' => -1,

View File

@ -146,7 +146,7 @@ class Unattend
def self.create_table(results)
return nil if results.nil? or results.empty?
table = Rex::Ui::Text::Table.new({
table = Rex::Text::Table.new({
'Header' => 'Unattend Credentials',
'Indent' => 1,
'Columns' => ['Type', 'Domain', 'Username', 'Password', 'Groups']

View File

@ -263,7 +263,7 @@ module Analyze
end
def table(name, cols)
Rex::Ui::Text::Table.new(
Rex::Text::Table.new(
'Header' => name,
'Columns' => cols
)

View File

@ -379,15 +379,15 @@ end
class ProcessList < Array
#
# Create a Rex::Ui::Text::Table out of the processes stored in this list
# Create a Rex::Text::Table out of the processes stored in this list
#
# +opts+ is passed on to Rex::Ui::Text::Table.new, mostly unmolested
# +opts+ is passed on to Rex::Text::Table.new, mostly unmolested
#
# Note that this output is affected by Rex::Post::Meterpreter::Client#unicode_filter_encode
#
def to_table(opts={})
if empty?
return Rex::Ui::Text::Table.new(opts)
return Rex::Text::Table.new(opts)
end
cols = [ "PID", "PPID", "Name", "Arch", "Session", "User", "Path" ]
@ -403,7 +403,7 @@ class ProcessList < Array
'Columns' => cols
}.merge(opts)
tbl = Rex::Ui::Text::Table.new(opts)
tbl = Rex::Text::Table.new(opts)
each { |process|
tbl << cols.map { |c|
col = c.downcase

View File

@ -111,7 +111,7 @@ class Console::CommandDispatcher::Android
header << " at #{time.strftime('%Y-%m-%d %H:%M:%S')}"
end
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => header,
'SortIndex' => 0,
'Columns' => result[:headers],
@ -616,7 +616,7 @@ class Console::CommandDispatcher::Android
result = client.android.sqlite_query(database, query, writeable)
unless writeable
header = "#{query} on database file #{database}"
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => header,
'Columns' => result[:columns],
'Indent' => 0

View File

@ -182,7 +182,7 @@ class Console::CommandDispatcher::Core
case mode
when :list
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Indent' => 4,
'Columns' =>
[
@ -732,7 +732,7 @@ class Console::CommandDispatcher::Core
end
# next draw up a table of transport entries
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'SortIndex' => 0, # sort by ID
'Indent' => 4,
'Columns' => columns)

View File

@ -294,7 +294,7 @@ class Console::CommandDispatcher::Extapi::Adsi
objects = client.extapi.adsi.domain_query(domain, filter, max_results, page_size, args)
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "#{domain} Objects",
'Indent' => 0,
'SortIndex' => 0,

View File

@ -86,7 +86,7 @@ class Console::CommandDispatcher::Extapi::Service
services = client.extapi.service.enumerate
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Service List',
'Indent' => 0,
'SortIndex' => 3,

View File

@ -82,7 +82,7 @@ class Console::CommandDispatcher::Extapi::Window
header = parent_window ? "Child windows of #{parent_window}" : "Top-level windows"
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => header,
'Indent' => 0,
'SortIndex' => 0,

View File

@ -75,7 +75,7 @@ class Console::CommandDispatcher::Extapi::Wmi
objects = client.extapi.wmi.query(query, root)
if objects
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => query,
'Indent' => 0,
'SortIndex' => 0,

View File

@ -259,7 +259,7 @@ class Console::CommandDispatcher::Kiwi
fields = ['Server', 'Client', 'Start', 'End', 'Max Renew', 'Flags']
fields << 'Export Path' if export
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Kerberos Tickets',
'Indent' => 0,
'SortIndex' => 0,
@ -335,7 +335,7 @@ class Console::CommandDispatcher::Kiwi
if results.length > 0
results.each do |r|
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "#{r[:desc]} - #{r[:guid]}",
'Indent' => 0,
'SortIndex' => 0,
@ -471,7 +471,7 @@ protected
print_status("Retrieving #{provider} credentials")
accounts = method.call
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "#{provider} credentials",
'Indent' => 0,
'SortIndex' => 0,

View File

@ -228,7 +228,7 @@ class Console::CommandDispatcher::Lanattacks::Dhcp
log = client.lanattacks.dhcp.log
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'DHCP Server Log',
'Indent' => 0,
'SortIndex' => 0,

View File

@ -95,7 +95,7 @@ class Console::CommandDispatcher::Mimikatz
print_status("Retrieving #{provider} credentials")
accounts = method.call
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "#{provider} credentials",
'Indent' => 0,
'SortIndex' => 4,

View File

@ -184,7 +184,7 @@ class Console::CommandDispatcher::Stdapi::Fs
mounts = client.fs.mount.show_mount
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Mounts / Drives',
'Indent' => 0,
'SortIndex' => 0,
@ -482,7 +482,7 @@ class Console::CommandDispatcher::Stdapi::Fs
return
end
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Listing: #{path}",
'SortIndex' => columns.index(sort),
'SortOrder' => order,

View File

@ -155,7 +155,7 @@ class Console::CommandDispatcher::Stdapi::Net
end
}
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'Connection list',
'Indent' => 4,
'Columns' => [
@ -206,7 +206,7 @@ class Console::CommandDispatcher::Stdapi::Net
end
}
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'ARP cache',
'Indent' => 4,
'Columns' => [
@ -280,7 +280,7 @@ class Console::CommandDispatcher::Stdapi::Net
routes = client.net.config.routes
# IPv4
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'IPv4 network routes',
'Indent' => 4,
'Columns' => [
@ -304,7 +304,7 @@ class Console::CommandDispatcher::Stdapi::Net
end
# IPv6
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'IPv6 network routes',
'Indent' => 4,
'Columns' => [
@ -412,7 +412,7 @@ class Console::CommandDispatcher::Stdapi::Net
case args.shift
when 'list'
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Active Port Forwards',
'Indent' => 3,
'SortIndex' => -1,
@ -616,7 +616,7 @@ class Console::CommandDispatcher::Stdapi::Net
response = client.net.resolve.resolve_hosts(hostnames, family)
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Host resolutions',
'Indent' => 4,
'SortIndex' => 0,

View File

@ -297,7 +297,7 @@ class Console::CommandDispatcher::Stdapi::Sys
if vars.length == 0
print_error("None of the specified environment variables were found/set.")
else
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'Environment Variables',
'Indent' => 0,
'SortIndex' => 1,

View File

@ -187,7 +187,7 @@ class Console::CommandDispatcher::Stdapi::Ui
desktops = client.ui.enum_desktops
desktopstable = Rex::Ui::Text::Table.new(
desktopstable = Rex::Text::Table.new(
'Header' => "Desktops",
'Indent' => 4,
'Columns' => [ "Session",

View File

@ -25,7 +25,7 @@ class RopBase
@gadgets = gadgets
end
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "#{@file} ROP Gadgets",
'Indent' => 1,
'Columns' =>

View File

@ -161,7 +161,7 @@ class Result
unless supports_ssl?
return "Server does not appear to support SSL on this port!"
end
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => 'SSL Ciphers',
'Indent' => 1,
'Columns' => ['Status', 'Weak', 'SSL Version', 'Key Length', 'Cipher'],

View File

@ -80,7 +80,7 @@ Windows and Linux.
end
if res && res.code == 200 && !res.body.empty?
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'WebNMS Login Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -97,7 +97,7 @@ class MetasploitModule < Msf::Auxiliary
end
# Create table for report
windows_domain_login_table = Rex::Ui::Text::Table.new(
windows_domain_login_table = Rex::Text::Table.new(
'Header' => 'Windows Domain Accounts',
'Ident' => 1,
'Columns' => ['name']

View File

@ -84,7 +84,7 @@ class MetasploitModule < Msf::Auxiliary
print_good("#{domain_users.length} user accounts, groups, and computer accounts were found.")
# Create table for report
windows_domain_login_table = Rex::Ui::Text::Table.new(
windows_domain_login_table = Rex::Text::Table.new(
'Header' => 'Windows Domain Accounts',
'Ident' => 1,
'Columns' => ['name']

View File

@ -356,7 +356,7 @@ class MetasploitModule < Msf::Auxiliary
end
# CREATE TABLE TO STORE SQL SERVER DATA LOOT
sql_data_tbl = Rex::Ui::Text::Table.new(
sql_data_tbl = Rex::Text::Table.new(
'Header' => 'SQL Server Data',
'Indent' => 1,
'Columns' => ['Server', 'Database', 'Schema', 'Table', 'Column', 'Data Type', 'Sample Data', 'Row Count']

View File

@ -151,7 +151,7 @@ class MetasploitModule < Msf::Auxiliary
print_good("#{@users.length} users found!")
end
users_table = Rex::Ui::Text::Table.new(
users_table = Rex::Text::Table.new(
'Header' => 'Advantech WebAccess Users',
'Indent' => 1,
'Columns' => ['Username', 'Encrypted Password', 'Key', 'Recovered password', 'Origin']

View File

@ -150,7 +150,7 @@ class MetasploitModule < Msf::Auxiliary
end
def grab
logins = Rex::Ui::Text::Table.new(
logins = Rex::Text::Table.new(
'Header' => "Schneider Modicon Quantum services, usernames, and passwords",
'Indent' => 1,
'Columns' => ["Service", "User Name", "Password"]

View File

@ -66,7 +66,7 @@ class MetasploitModule < Msf::Auxiliary
print_status("Listing \\\\#{datastore['RHOST']}\\#{datastore['SMBSHARE']}\\#{datastore['RPATH']}'...")
end
listing = self.simple.client.find_first("\\#{datastore['RPATH']}\\*")
directory = Rex::Ui::Text::Table.new(
directory = Rex::Text::Table.new(
'Header' => "Directory Listing of \\\\#{datastore['RHOST']}\\#{datastore['SMBSHARE']}\\#{datastore['RPATH']}",
'Indent' => 2,
'SortIndex' => 2,

View File

@ -32,7 +32,7 @@ class MetasploitModule < Msf::Auxiliary
return unless res && res.code == 200
waps = Rex::Ui::Text::Table.new(
waps = Rex::Text::Table.new(
'Header' => 'Wireless Access Points',
'Columns' => [
'BSSID',

View File

@ -222,7 +222,7 @@ class MetasploitModule < Msf::Auxiliary
headerlen = makeword(f.read(2))
f.seek(userentryptr + 40) # sorry decimal
entrylen = makeword(f.read(2)) # sorry this is decimal
logins = Rex::Ui::Text::Table.new(
logins = Rex::Text::Table.new(
'Header' => "D20 usernames, passwords, and account levels\n(use for TELNET authentication)",
'Indent' => 1,
'Columns' => ["Type", "User Name", "Password"])

View File

@ -192,7 +192,7 @@ class MetasploitModule < Msf::Auxiliary
print_warning("No credentials collected.")
return
end
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'Dolibarr User Credentials',
'Indent' => 1,
'Columns' => ['Username', 'Password', 'Admin', 'E-mail']

View File

@ -98,7 +98,7 @@ class MetasploitModule < Msf::Auxiliary
return
end
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'Network Shutdown Module Credentials',
'Indent' => 1,
'Columns' => ['Username', 'Password']

View File

@ -90,7 +90,7 @@ class MetasploitModule < Msf::Auxiliary
end
end
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'ManageEngine EventLog Analyzer Managed Devices Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -142,7 +142,7 @@ class MetasploitModule < Msf::Auxiliary
return
end
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'Domain Controllers Credentials',
'Indent' => 1,
'Columns' => ['Domain Controller', 'Username', 'Password']

View File

@ -134,7 +134,7 @@ class MetasploitModule < Msf::Auxiliary
return if keys.size == 0
data = data_for_keys(keys)
result_table = Rex::Ui::Text::Table.new(
result_table = Rex::Text::Table.new(
'Header' => "Keys/Values Found for #{peer}",
'Indent' => 1,
'Columns' => [ 'Key', 'Value' ]

View File

@ -144,7 +144,7 @@ class MetasploitModule < Msf::Auxiliary
end
# Save the results to this table
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'Search Results',
'Indent' => 1,
'Columns' => ['IP:Port', 'City', 'Country', 'Hostname']

View File

@ -189,7 +189,7 @@ class MetasploitModule < Msf::Auxiliary
count_users = data.to_i
print_good("#{count_users} users found. Collecting credentials...")
users_table = Rex::Ui::Text::Table.new(
users_table = Rex::Text::Table.new(
'Header' => 'vBulletin Users',
'Indent' => 1,
'Columns' => ['Username', 'Password Hash', 'Salt']

View File

@ -91,7 +91,7 @@ class MetasploitModule < Msf::Auxiliary
:info => "#{WDS_CONST::WDSCP_RPC_UUID} v1.0 Windows Deployment Services"
)
table = Rex::Ui::Text::Table.new({
table = Rex::Text::Table.new({
'Header' => 'Windows Deployment Services',
'Indent' => 1,
'Columns' => ['Architecture', 'Type', 'Domain', 'Username', 'Password']

View File

@ -88,7 +88,7 @@ class MetasploitModule < Msf::Auxiliary
def show_results(target_host)
print_good("#{rhost}:#{rport} JBoss application server found")
req_table = Rex::Ui::Text::Table.new(
req_table = Rex::Text::Table.new(
'Header' => 'JBoss application server requests',
'Indent' => 1,
'Columns' => ['Client', 'Vhost target', 'Request']

View File

@ -93,7 +93,7 @@ class MetasploitModule < Msf::Auxiliary
workspace_id: myworkspace_id
}
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'ManageEngine DeviceExpert User Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -128,7 +128,7 @@ class MetasploitModule < Msf::Auxiliary
sock.put(DDNS)
return unless (response = sock.get_once)
data = response.split(/&&[0-1]&&/)
ddns_table = Rex::Ui::Text::Table.new(
ddns_table = Rex::Text::Table.new(
'Header' => 'Dahua DDNS Settings',
'Indent' => 1,
'Columns' => ['Peer', 'DDNS Service', 'DDNS Server', 'DDNS Port', 'Domain', 'Username', 'Password']
@ -186,7 +186,7 @@ class MetasploitModule < Msf::Auxiliary
connect
sock.put(CHANNELS)
data = sock.get_once.split('&&')
channels_table = Rex::Ui::Text::Table.new(
channels_table = Rex::Text::Table.new(
'Header' => 'Dahua Camera Channels',
'Indent' => 1,
'Columns' => ['ID', 'Peer', 'Channels']
@ -206,7 +206,7 @@ class MetasploitModule < Msf::Auxiliary
return unless (response = sock.get_once)
data = response.split('&&')
usercount = 0
users_table = Rex::Ui::Text::Table.new(
users_table = Rex::Text::Table.new(
'Header' => 'Dahua Users Hashes and Rights',
'Indent' => 1,
'Columns' => ['Peer', 'Username', 'Password Hash', 'Groups', 'Permissions', 'Description']
@ -237,7 +237,7 @@ class MetasploitModule < Msf::Auxiliary
sock.put(GROUPS)
return unless (response = sock.get_once)
data = response.split('&&')
groups_table = Rex::Ui::Text::Table.new(
groups_table = Rex::Text::Table.new(
'Header' => 'Dahua groups',
'Indent' => 1,
'Columns' => ['ID', 'Peer', 'Group']

View File

@ -50,7 +50,7 @@ class MetasploitModule < Msf::Auxiliary
return if maps.empty?
vprint_good("Found #{maps.size} programs available")
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "SunRPC Programs for #{ip}",
'Indent' => 1,
'Columns' => %w(Name Number Version Port Protocol)

View File

@ -110,7 +110,7 @@ class MetasploitModule < Msf::Auxiliary
:proto => 'tcp'
)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'MS SQL Server Hashes',
'Indent' => 1,
'Columns' => ['Username', 'Hash']

View File

@ -177,7 +177,7 @@ class MetasploitModule < Msf::Auxiliary
end
# Create a table to store data
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'MysQL Server Hashes',
'Indent' => 1,
'Columns' => ['Username', 'Hash']

View File

@ -55,7 +55,7 @@ class MetasploitModule < Msf::Auxiliary
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'Oracle Server Hashes',
'Indent' => 1,
'Columns' => ['Username', 'Hash']

View File

@ -94,7 +94,7 @@ class MetasploitModule < Msf::Auxiliary
end
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'Postgres Server Hashes',
'Indent' => 1,
'Columns' => ['Username', 'Hash']

View File

@ -321,7 +321,7 @@ class MetasploitModule < Msf::Auxiliary
write = false
# Creating a separate file for each IP address's results.
detailed_tbl = Rex::Ui::Text::Table.new(
detailed_tbl = Rex::Text::Table.new(
'Header' => "Spidered results for #{ip}.",
'Indent' => 1,
'Columns' => [ 'IP Address', 'Type', 'Share', 'Path', 'Name', 'Created', 'Accessed', 'Written', 'Changed', 'Size' ]
@ -368,7 +368,7 @@ class MetasploitModule < Msf::Auxiliary
header << "\\#{x.sub("C$","C$\\")}" if simple.client.default_name
header << subdirs[0]
pretty_tbl = Rex::Ui::Text::Table.new(
pretty_tbl = Rex::Text::Table.new(
'Header' => header,
'Indent' => 1,
'Columns' => [ 'Type', 'Name', 'Created', 'Accessed', 'Written', 'Changed', 'Size' ]

View File

@ -67,7 +67,7 @@ class MetasploitModule < Msf::Auxiliary
when :error
print_error "An error occured while trying to enumerate the permissions on #{ip}"
else
tmp_perms = Rex::Ui::Text::Table.new(
tmp_perms = Rex::Text::Table.new(
'Header' => "Permissions for VMWare #{ip}",
'Indent' => 1,
'Columns' => ['Name', 'IsAGroup', 'Role', 'Role Summary']

View File

@ -40,12 +40,12 @@ class MetasploitModule < Msf::Auxiliary
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
# Get local Users and Groups
user_list = vim_get_user_list(nil)
tmp_users = Rex::Ui::Text::Table.new(
tmp_users = Rex::Text::Table.new(
'Header' => "Users for server #{ip}",
'Indent' => 1,
'Columns' => ['Name', 'Description']
)
tmp_groups = Rex::Ui::Text::Table.new(
tmp_groups = Rex::Text::Table.new(
'Header' => "Groups for server #{ip}",
'Indent' => 1,
'Columns' => ['Name', 'Description']
@ -85,13 +85,13 @@ class MetasploitModule < Msf::Auxiliary
else
# Enumerate Domain Users and Groups
esx_domains.each do |domain|
tmp_dusers = Rex::Ui::Text::Table.new(
tmp_dusers = Rex::Text::Table.new(
'Header' => "Users for domain #{domain}",
'Indent' => 1,
'Columns' => ['Name', 'Description']
)
tmp_dgroups = Rex::Ui::Text::Table.new(
tmp_dgroups = Rex::Text::Table.new(
'Header' => "Groups for domain #{domain}",
'Indent' => 1,
'Columns' => ['Name', 'Description']

View File

@ -111,7 +111,7 @@ class MetasploitModule < Msf::Exploit::Remote
master..sysservers where dataaccess=1 and srvname!=@@servername and srvproduct = 'SQL Server')as linkcount"
# Create loot table to store configuration information from crawled database server links
linked_server_table = Rex::Ui::Text::Table.new(
linked_server_table = Rex::Text::Table.new(
'Header' => 'Linked Server Table',
'Indent' => 1,
'Columns' => ['db_server', 'db_version', 'db_os', 'link_server', 'link_user', 'link_privilege', 'link_version', 'link_os','link_state']

View File

@ -52,7 +52,7 @@ class MetasploitModule < Msf::Post
end
def extract_all_creds
tbl = Rex::Ui::Text::Table.new({
tbl = Rex::Text::Table.new({
'Header' => '802-11-wireless-security',
'Columns' => ['AccessPoint-Name', 'PSK'],
'Indent' => 1,

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Post
# where we'll store hashes of found credentials while parsing. reporting is done at the end.
creds = []
# A table to store the found credentials for loot storage afterward
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => "mount.cifs credentials",
'Indent' => 1,
'Columns' =>

View File

@ -85,7 +85,7 @@ class MetasploitModule < Msf::Post
# Extracts client, server, secret, and IP addresses
#
def extract_secrets(data)
tbl = Rex::Ui::Text::Table.new({
tbl = Rex::Text::Table.new({
'Header' => 'PPTPd chap-secrets',
'Indent' => 1,
'Columns' => ['Client', 'Server', 'Secret', 'IP']

View File

@ -81,7 +81,7 @@ class MetasploitModule < Msf::Post
print_status("#{rhost} - SHA1: #{sha1}") unless sha1.blank?
print_status("#{rhost} - SHA256: #{sha256}") unless sha256.blank?
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Analysis Report: #{filename} (#{res['positives']} / #{res['total']}): #{res['sha256']}",
'Indent' => 1,
'Columns' => ['Antivirus', 'Detected', 'Version', 'Result', 'Update']

View File

@ -112,7 +112,7 @@ class MetasploitModule < Msf::Post
# New config file parse function
def parse_new_config_file(raw_xml)
db_table = Rex::Ui::Text::Table.new(
db_table = Rex::Text::Table.new(
'Header' => "DbVisualizer Databases",
'Indent' => 2,
'Columns' =>
@ -219,7 +219,7 @@ class MetasploitModule < Msf::Post
# New config file parse function
def parse_old_config_file(raw_xml)
db_table = Rex::Ui::Text::Table.new(
db_table = Rex::Text::Table.new(
'Header' => 'DbVisualizer Databases',
'Indent' => 2,
'Columns' =>

View File

@ -26,7 +26,7 @@ class MetasploitModule < Msf::Post
def run
# A table to store the found credentials.
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => ".fetchmailrc credentials",
'Indent' => 1,
'Columns' =>

View File

@ -663,7 +663,7 @@ Components.utils.import("resource://gre/modules/XPCOMUtils.jsm");
file_rm(@paths['loot'])
# Create table to store
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'Firefox Credentials',
'Indent' => 1,
'Columns'=>

View File

@ -376,7 +376,7 @@ class MetasploitModule < Msf::Post
# Print all extracted LastPass data
def print_lastpass_data(account_map)
lastpass_data_table = Rex::Ui::Text::Table.new(
lastpass_data_table = Rex::Text::Table.new(
'Header' => "LastPass Accounts",
'Indent' => 1,
'Columns' => %w(Account LP_Username LP_Password LP_2FA LP_Key)
@ -662,7 +662,7 @@ class MetasploitModule < Msf::Post
account_map.each_pair do |account, browser_map|
browser_map.each_pair do |browser, lp_data|
lp_data['lp_creds'].each_pair do |username, user_data|
lastpass_vault_data_table = Rex::Ui::Text::Table.new(
lastpass_vault_data_table = Rex::Text::Table.new(
'Header' => "Decrypted vault from #{username}",
'Indent' => 1,
'Columns' => %w(URL Username Password)

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Post
def run
# A table to store the found credentials.
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => ".netrc credentials",
'Indent' => 1,
'Columns' =>

View File

@ -66,7 +66,7 @@ class MetasploitModule < Msf::Post
# Store the creds to
def parse_creds(f)
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'Postgres Data',
'Indent' => 1,
'Columns' => ['Host', 'Port', 'DB', 'User', 'Password']

View File

@ -130,7 +130,7 @@ class MetasploitModule < Msf::Post
end
data = ""
credentials = Rex::Ui::Text::Table.new(
credentials = Rex::Text::Table.new(
'Header' => "Pidgin Credentials",
'Indent' => 1,
'Columns' =>
@ -143,7 +143,7 @@ class MetasploitModule < Msf::Post
"Port"
])
buddylists = Rex::Ui::Text::Table.new(
buddylists = Rex::Text::Table.new(
'Header' => "Pidgin Contact List",
'Indent' => 1,
'Columns' =>

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Post
vprint_status('No Reminna credentials collected')
else
vprint_good("Collected #{creds.size} sets of Remmina credentials")
cred_table = Rex::Ui::Text::Table.new(
cred_table = Rex::Text::Table.new(
'Header' => 'Remmina Credentials',
'Indent' => 1,
'Columns' => %w(Host Port Service User Password)

View File

@ -61,7 +61,7 @@ class MetasploitModule < Msf::Post
response = client.net.resolve.resolve_hosts(hosts, family)
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Indent' => 0,
'SortIndex' => -1,
'Columns' =>

View File

@ -42,7 +42,7 @@ class MetasploitModule < Msf::Post
def dump_rsync_secrets(config_file)
vprint_status("Attempting to get RSYNC creds from #{config_file}")
creds_table = Rex::Ui::Text::Table.new(
creds_table = Rex::Text::Table.new(
'Header' => "RSYNC credentials from #{config_file}",
'Columns' => %w(Username Password Module)
)

View File

@ -165,7 +165,7 @@ class MetasploitModule < Msf::Post
end
# Create a rex table to store our data
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'Thunderbird login data',
'Indent' => 1,
'Columns' =>

View File

@ -157,7 +157,7 @@ class MetasploitModule < Msf::Post
# Runs the module
#
def run
cred_tbl = Rex::Ui::Text::Table.new({
cred_tbl = Rex::Text::Table.new({
'Header' => 'Credentials',
'Indent' => 1,
'Columns' => ['Domain', 'Username', 'Password']

View File

@ -271,7 +271,7 @@ class MetasploitModule < Msf::Post
def run
@credentials = Rex::Ui::Text::Table.new(
@credentials = Rex::Text::Table.new(
'Header' => "MSCACHE Credentials",
'Indent' => 1,
'Columns' =>

View File

@ -290,7 +290,7 @@ class MetasploitModule < Msf::Post
end
# Report / Show findings
@credentials = Rex::Ui::Text::Table.new(
@credentials = Rex::Text::Table.new(
'Header' => "BulletProof FTP Client Bookmarks",
'Indent' => 1,
'Columns' =>

View File

@ -123,13 +123,13 @@ class MetasploitModule < Msf::Post
#
def do_report(data)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => 'DynDNS Client Data',
'Indent' => 1,
'Columns' => ['Field', 'Value']
)
creds = Rex::Ui::Text::Table.new(
creds = Rex::Text::Table.new(
'Header' => 'DynDNS Credentials',
'Indent' => 1,
'Columns' => ['User', 'Password']

View File

@ -75,11 +75,11 @@ class MetasploitModule < Msf::Post
# the database if datastore option STORE_DB is true.
#
# @param [Array<Array<Hash>>] the LDAP query results to parse
# @return [Rex::Ui::Text::Table] the table containing all the result data
# @return [Rex::Text::Table] the table containing all the result data
def parse_results(results)
laps_results = []
# Results table holds raw string data
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => 'Local Administrator Password Solution (LAPS) Results',
'Indent' => 1,
'SortIndex' => -1,

View File

@ -73,7 +73,7 @@ class MetasploitModule < Msf::Post
username = registry_getvaldata("HKCU\\Software\\Google\\Picasa\\Picasa2\\Preferences\\", 'GaiaEmail') || ''
password = registry_getvaldata("HKCU\\Software\\Google\\Picasa\\Picasa2\\Preferences\\", 'GaiaPass') || ''
credentials = Rex::Ui::Text::Table.new(
credentials = Rex::Text::Table.new(
'Header' => "Picasa Credentials",
'Indent' => 1,
'Columns' =>

View File

@ -103,7 +103,7 @@ class MetasploitModule < Msf::Post
def get_filezilla_creds(paths)
fs_xml = "" # FileZilla Server.xml - Settings for the local install
fsi_xml = "" # FileZilla Server Interface.xml - Last server used with the interface
credentials = Rex::Ui::Text::Table.new(
credentials = Rex::Text::Table.new(
'Header' => "FileZilla FTP Server Credentials",
'Indent' => 1,
'Columns' =>
@ -115,7 +115,7 @@ class MetasploitModule < Msf::Post
"SSL"
])
permissions = Rex::Ui::Text::Table.new(
permissions = Rex::Text::Table.new(
'Header' => "FileZilla FTP Server Permissions",
'Indent' => 1,
'Columns' =>
@ -135,7 +135,7 @@ class MetasploitModule < Msf::Post
"Home"
])
configuration = Rex::Ui::Text::Table.new(
configuration = Rex::Text::Table.new(
'Header' => "FileZilla FTP Server Configuration",
'Indent' => 1,
'Columns' =>
@ -150,7 +150,7 @@ class MetasploitModule < Msf::Post
"SSL Key Password"
])
lastserver = Rex::Ui::Text::Table.new(
lastserver = Rex::Text::Table.new(
'Header' => "FileZilla FTP Last Server",
'Indent' => 1,
'Columns' =>

View File

@ -32,7 +32,7 @@ class MetasploitModule < Msf::Post
end
def run
creds = Rex::Ui::Text::Table.new(
creds = Rex::Text::Table.new(
'Header' => 'Internet Downloader Manager Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -140,7 +140,7 @@ class MetasploitModule < Msf::Post
end
def report(users)
credentials = Rex::Ui::Text::Table.new(
credentials = Rex::Text::Table.new(
'Header' => 'Ipswitch iMail User Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -37,7 +37,7 @@ class MetasploitModule < Msf::Post
def run
creds = Rex::Ui::Text::Table.new(
creds = Rex::Text::Table.new(
'Header' => 'IMVU Credentials',
'Indent' => 1,
'Columns' =>[

View File

@ -42,7 +42,7 @@ class MetasploitModule < Msf::Post
def parse_txt(file)
begin
creds = Rex::Ui::Text::Table.new(
creds = Rex::Text::Table.new(
'Header' => 'Meebo Instant Messenger Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -29,7 +29,7 @@ class MetasploitModule < Msf::Post
end
def run
creds = Rex::Ui::Text::Table.new(
creds = Rex::Text::Table.new(
'Header' => 'Nimbuzz Instant Messenger Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -76,7 +76,7 @@ class MetasploitModule < Msf::Post
def run
print_status("Checking All Users...")
creds_tbl = Rex::Ui::Text::Table.new(
creds_tbl = Rex::Text::Table.new(
'Header' => 'RazorSQL User Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -76,7 +76,7 @@ class MetasploitModule < Msf::Post
vprint_error("LiveSSP credentials not present")
end
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "Windows SSO Credentials",
'Indent' => 0,
'SortIndex' => 0,

View File

@ -54,7 +54,7 @@ class MetasploitModule < Msf::Post
return
end
creds = Rex::Ui::Text::Table.new(
creds = Rex::Text::Table.new(
'Header' => 'Trillian versions 4-5 Instant Messenger Credentials',
'Indent' => 1,
'Columns' =>

View File

@ -17,7 +17,7 @@ class MetasploitModule < Msf::Post
end
def run
rtable = Rex::Ui::Text::Table.new(
rtable = Rex::Text::Table.new(
'Header' => 'DNS Cached Entries',
'Indent' => 3,
'Columns' => ['TYPE', 'DOMAIN']

View File

@ -53,7 +53,7 @@ class MetasploitModule < Msf::Post
end
# Results table holds raw string data
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => 'BitLocker Recovery Passwords',
'Indent' => 1,
'SortIndex' => -1,

View File

@ -71,7 +71,7 @@ class MetasploitModule < Msf::Post
return if q.nil? or q[:results].empty?
# Results table holds raw string data
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => "Domain Computers",
'Indent' => 1,
'SortIndex' => -1,

View File

@ -69,10 +69,10 @@ class MetasploitModule < Msf::Post
# the database.
#
# @param [Array<Array<Hash>>] the LDAP query results to parse
# @return [Rex::Ui::Text::Table] the table containing all the result data
# @return [Rex::Text::Table] the table containing all the result data
def parse_results(results)
# Results table holds raw string data
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => "Domain Groups",
'Indent' => 1,
'SortIndex' => -1,

View File

@ -75,7 +75,7 @@ class MetasploitModule < Msf::Post
# Takes the results of LDAP query, parses them into a table
def parse_results(results)
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => "Groups with Managers",
'Indent' => 1,
'SortIndex' => -1,

View File

@ -74,7 +74,7 @@ class MetasploitModule < Msf::Post
fields << "Host"
# Results table holds raw string data
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => "Service Principal Names",
'Indent' => 1,
'SortIndex' => -1,

View File

@ -53,7 +53,7 @@ class MetasploitModule < Msf::Post
end
# Results table holds raw string data
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => "Domain Users",
'Indent' => 1,
'SortIndex' => -1,

View File

@ -105,12 +105,12 @@ class MetasploitModule < Msf::Post
# the database.
#
# @param [Array<Array<Hash>>] the LDAP query results to parse
# @return [Rex::Ui::Text::Table] the table containing all the result data
# @return [Rex::Text::Table] the table containing all the result data
def parse_results(results)
domain = datastore['DOMAIN'] || get_domain
domain_ip = client.net.resolve.resolve_host(domain)[:ip]
# Results table holds raw string data
results_table = Rex::Ui::Text::Table.new(
results_table = Rex::Text::Table.new(
'Header' => "Domain Users",
'Indent' => 1,
'SortIndex' => -1,

View File

@ -23,7 +23,7 @@ class MetasploitModule < Msf::Post
end
def app_list
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Installed Applications",
'Indent' => 1,
'Columns' =>

View File

@ -99,7 +99,7 @@ class MetasploitModule < Msf::Post
print_status("No #{exclusion_type} exclusions for #{product}")
return
end
table = Rex::Ui::Text::Table.new(
table = Rex::Text::Table.new(
'Header' => "#{product} excluded #{exclusion_type.pluralize}",
'Indent' => 1,
'Columns' => [ exclusion_type.capitalize ]

View File

@ -131,7 +131,7 @@ class MetasploitModule < Msf::Post
def process_files(username)
secrets = ""
decrypt_table = Rex::Ui::Text::Table.new(
decrypt_table = Rex::Text::Table.new(
"Header" => "Decrypted data",
"Indent" => 1,
"Columns" => ["Name", "Decrypted Data", "Origin"]

View File

@ -76,7 +76,7 @@ class MetasploitModule < Msf::Post
end
def list_computers(domain,hosts)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "List of Domain Hosts for the primary Domain.",
'Indent' => 1,
'Columns' =>

View File

@ -56,7 +56,7 @@ class MetasploitModule < Msf::Post
print_status("Done, Databases Found.")
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Installed Databases",
'Indent' => 1,
'Columns' =>

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Post
end
def list
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Device Information",
'Indent' => 1,
'Columns' =>

View File

@ -93,7 +93,7 @@ class MetasploitModule < Msf::Post
# List Tokens precent on the domain
def list_tokens(domain,dom_admins)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Impersonation Tokens with Domain Context",
'Indent' => 1,
'Columns' =>
@ -161,7 +161,7 @@ class MetasploitModule < Msf::Post
end
def list_group_members(domain,dom_admins)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Account in Local Groups with Domain Context",
'Indent' => 1,
'Columns' =>
@ -210,7 +210,7 @@ class MetasploitModule < Msf::Post
end
def list_processes(domain,dom_admins)
tbl = Rex::Ui::Text::Table.new(
tbl = Rex::Text::Table.new(
'Header' => "Processes under Domain Context",
'Indent' => 1,
'Columns' =>

Some files were not shown because too many files have changed in this diff Show More