Beautify description

bug/bundler_fix
jvazquez-r7 2014-11-24 11:27:32 -06:00
parent c52104e91d
commit ecb74c543a
1 changed files with 5 additions and 6 deletions

View File

@ -15,12 +15,11 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info, super(update_info(info,
'Name' => 'Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration', 'Name' => 'Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration',
'Description' => %q{ 'Description' => %q{
This module can be used to brute force RIDs associated with the domain of This module can be used to brute force RIDs associated with the domain of the SQL Server
the SQL Server using the SUSER_SNAME function. This is similar to the using the SUSER_SNAME function. This is similar to the smb_lookupsid module, but executed
smb_lookupsid module, but executed through SQL Server queries as any user through SQL Server queries as any user with the PUBLIC role (everyone). Information that
with the PUBLIC role (everyone). Information that can be enumerated includes can be enumerated includes Windows domain users, groups, and computer accounts. Enumerated
Windows domain users, groups, and computer accounts. Enumerated accounts can accounts can then be used in online dictionary attacks.
then be used in online dictionary attacks.
}, },
'Author' => 'Author' =>
[ [