Skip to content

Commit 87c83cb

Browse files
committed
Another round of name corrections
1 parent bb8dfdb commit 87c83cb

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

modules/auxiliary/admin/mssql/mssql_escalate_execute_as_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Microsoft SQL Server SQLi Escalate Execute As',
16+
'Name' => 'Microsoft SQL Server SQLi Escalate Execute AS',
1717
'Description' => %q{
1818
This module can be used escalate privileges if the IMPERSONATION privilege has been
1919
assigned to the user via error based SQL injection. In most cases, this results in

modules/auxiliary/admin/mssql/mssql_ntlm_stealer_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ class Metasploit3 < Msf::Auxiliary
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'Microsoft SQL Server NTLM Stealer via SQLi',
14+
'Name' => 'Microsoft SQL Server SQLi NTLM Stealer',
1515
'Description' => %q{
1616
This module can be used to help capture or relay the LM/NTLM credentials of the
1717
account running the remote SQL Server service. The module will use the SQL

0 commit comments

Comments
 (0)