We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 85e0d72 commit 4b06334Copy full SHA for 4b06334
modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
13
14
def initialize(info = {})
15
super(update_info(info,
16
- 'Name' => 'Microsoft SQL Server - SQLi SUSER_SNAME Domain Account Enumeration',
+ 'Name' => 'Microsoft SQL Server SQLi SUSER_SNAME Domain Account Enumeration',
17
'Description' => %q{
18
This module can be used to brute force RIDs associated with the domain of the SQL Server
19
using the SUSER_SNAME function via Error Based SQL injection. This is similar to the
0 commit comments