@@ -24,7 +24,7 @@ def initialize(info={})
24
24
This module will recover the LAPS (Local Administrator Password Solution) passwords,
25
25
configured in active directory. Note, only privileged users should be able to access
26
26
these fields. Note: The local administrator account name is not stored in active directory,
27
- by default credentials will be stored in the database against 'Administrator'.
27
+ so we assume that this will be 'Administrator' by default .
28
28
} ,
29
29
'License' => MSF_LICENSE ,
30
30
'Author' =>
@@ -33,10 +33,6 @@ def initialize(info={})
33
33
] ,
34
34
'Platform' => [ 'win' ] ,
35
35
'SessionTypes' => [ 'meterpreter' ] ,
36
- 'References' =>
37
- [
38
- [ 'URL' , 'http://test' ] ,
39
- ]
40
36
) )
41
37
42
38
register_options ( [
@@ -56,14 +52,14 @@ def run
56
52
begin
57
53
q = query ( search_filter , max_search , FIELDS )
58
54
rescue RuntimeError => e
59
- # Raised when the default naming context isn't specified as distinguished name
60
55
print_error ( e . message )
61
56
return
62
57
end
63
58
64
59
if q . nil? || q [ :results ] . empty?
65
60
print_status ( 'No results returned.' )
66
61
else
62
+ print_status ( 'Parsing results...' )
67
63
results_table = parse_results ( q [ :results ] )
68
64
print_line results_table . to_s
69
65
@@ -76,7 +72,7 @@ def run
76
72
77
73
# Takes the results of LDAP query, parses them into a table
78
74
# and records and usernames as {Metasploit::Credential::Core}s in
79
- # the database.
75
+ # the database if datastore option STORE_DB is true .
80
76
#
81
77
# @param [Array<Array<Hash>>] the LDAP query results to parse
82
78
# @return [Rex::Ui::Text::Table] the table containing all the result data
0 commit comments