1
1
##
2
- # This module requires Metasploit: http//metasploit.com/download
2
+ # This module requires Metasploit: http: //metasploit.com/download
3
3
# Current source: https://github.com/rapid7/metasploit-framework
4
4
##
5
5
@@ -14,18 +14,18 @@ class Metasploit3 < Msf::Post
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
16
'Name' => 'Windows Gather Active Directory BitLocker Recovery' ,
17
- 'Description' => %(
18
- This module will enumerate BitLocker recovery passwords in the default AD
19
- directory. Requires Domain Admin or other delegated privileges.
20
- ) ,
17
+ 'Description' => %q{
18
+ This module will enumerate BitLocker recovery passwords in the default AD
19
+ directory. Requires Domain Admin or other delegated privileges.
20
+ } ,
21
21
'License' => MSF_LICENSE ,
22
- 'Author' => [ 'Ben Campbell <ben.campbell[at]mwrinfosecurity.com>' ] ,
23
- 'Platform' => [ 'win' ] ,
24
- 'SessionTypes' => [ 'meterpreter' ] ,
22
+ 'Author' => [ 'Ben Campbell <ben.campbell[at]mwrinfosecurity.com>' ] ,
23
+ 'Platform' => [ 'win' ] ,
24
+ 'SessionTypes' => [ 'meterpreter' ] ,
25
25
'References' =>
26
- [
27
- [ 'URL' , 'https://technet.microsoft.com/en-us/library/cc771778%28v=ws.10%29.aspx' ]
28
- ]
26
+ [
27
+ [ 'URL' , 'https://technet.microsoft.com/en-us/library/cc771778%28v=ws.10%29.aspx' ]
28
+ ]
29
29
) )
30
30
31
31
register_options ( [
@@ -66,6 +66,7 @@ def run
66
66
end
67
67
68
68
print_line results_table . to_s
69
+
69
70
if datastore [ 'STORE_LOOT' ]
70
71
stored_path = store_loot ( 'bitlocker.recovery' , 'text/plain' , session , results_table . to_csv )
71
72
print_status ( "Results saved to: #{ stored_path } " )
0 commit comments