Skip to content

Commit 2f6c4a9

Browse files
author
HD Moore
committed
Slight tweak to description/author email formatting
1 parent 2f92a83 commit 2f6c4a9

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ class Metasploit3 < Msf::Auxiliary
1414
def initialize
1515
super(
1616
'Name' => 'SMTP NTLM Domain Extraction',
17-
'Description' => 'Extract the Windows domain name given an NTLM challenge.',
17+
'Description' => 'Extract the Windows domain name from a SMTP NTLM challenge.',
1818
'References' => [ ['URL', 'http://msdn.microsoft.com/en-us/library/cc246870.aspx' ] ],
19-
'Author' => [ 'Rich Whitcroft <rwhitcroft@digitalboundary.net>' ],
19+
'Author' => [ 'Rich Whitcroft <rwhitcroft[at]digitalboundary.net>' ],
2020
'License' => MSF_LICENSE
2121
)
2222

@@ -33,11 +33,11 @@ def run_host(ip)
3333
begin
3434
domain = nil
3535
connect
36-
print_status("Connected to #{ip}:#{datastore['RPORT']}")
36+
vprint_status("Connected to #{ip}:#{datastore['RPORT']}")
3737

3838
# send a EHLO and parse the extensions returned
3939
sock.puts("EHLO " + datastore['EHLO_DOMAIN'] + "\r\n")
40-
exts = sock.get_once.split(/\n/)
40+
exts = sock.get_once.to_s.split(/\n/)
4141

4242
# loop through all returned extensions related to NTLM
4343
exts.grep(/NTLM/).each do |ext|

0 commit comments

Comments
 (0)