Skip to content

Commit 9c4a967

Browse files
committed
Small tidyup
1 parent 4392b7c commit 9c4a967

File tree

1 file changed

+3
-7
lines changed

1 file changed

+3
-7
lines changed

modules/post/windows/gather/credentials/enum_laps.rb

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ def initialize(info={})
2424
This module will recover the LAPS (Local Administrator Password Solution) passwords,
2525
configured in active directory. Note, only privileged users should be able to access
2626
these fields. Note: The local administrator account name is not stored in active directory,
27-
by default credentials will be stored in the database against 'Administrator'.
27+
so we assume that this will be 'Administrator' by default.
2828
},
2929
'License' => MSF_LICENSE,
3030
'Author' =>
@@ -33,10 +33,6 @@ def initialize(info={})
3333
],
3434
'Platform' => [ 'win' ],
3535
'SessionTypes' => [ 'meterpreter' ],
36-
'References' =>
37-
[
38-
['URL', 'http://test'],
39-
]
4036
))
4137

4238
register_options([
@@ -56,14 +52,14 @@ def run
5652
begin
5753
q = query(search_filter, max_search, FIELDS)
5854
rescue RuntimeError => e
59-
# Raised when the default naming context isn't specified as distinguished name
6055
print_error(e.message)
6156
return
6257
end
6358

6459
if q.nil? || q[:results].empty?
6560
print_status('No results returned.')
6661
else
62+
print_status('Parsing results...')
6763
results_table = parse_results(q[:results])
6864
print_line results_table.to_s
6965

@@ -76,7 +72,7 @@ def run
7672

7773
# Takes the results of LDAP query, parses them into a table
7874
# and records and usernames as {Metasploit::Credential::Core}s in
79-
# the database.
75+
# the database if datastore option STORE_DB is true.
8076
#
8177
# @param [Array<Array<Hash>>] the LDAP query results to parse
8278
# @return [Rex::Ui::Text::Table] the table containing all the result data

0 commit comments

Comments
 (0)