Skip to content

Commit bb8dfdb

Browse files
committed
Ensure consistency for mssql modules
1 parent 4b06334 commit bb8dfdb

8 files changed

+8
-8
lines changed

modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Microsoft SQL Server SQLi SUSER_SNAME Domain Account Enumeration',
16+
'Name' => 'Microsoft SQL Server SQLi SUSER_SNAME Windows Domain Account Enumeration',
1717
'Description' => %q{
1818
This module can be used to brute force RIDs associated with the domain of the SQL Server
1919
using the SUSER_SNAME function via Error Based SQL injection. This is similar to the

modules/auxiliary/admin/mssql/mssql_escalate_dbowner.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Microsoft SQL Server - Escalate Db_Owner',
15+
'Name' => 'Microsoft SQL Server Escalate Db_Owner',
1616
'Description' => %q{
1717
This module can be used to escalate privileges to sysadmin if the user has
1818
the db_owner role in a trustworthy database owned by a sysadmin user. Once

modules/auxiliary/admin/mssql/mssql_escalate_dbowner_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Microsoft SQL Server - SQLi Escalate Db_Owner',
16+
'Name' => 'Microsoft SQL Server SQLi Escalate Db_Owner',
1717
'Description' => %q{
1818
This module can be used to escalate SQL Server user privileges to sysadmin through a web
1919
SQL Injection. In order to escalate, the database user must to have the db_owner role in

modules/auxiliary/admin/mssql/mssql_escalate_execute_as.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Microsoft SQL Server - Escalate EXECUTE AS',
15+
'Name' => 'Microsoft SQL Server Escalate EXECUTE AS',
1616
'Description' => %q{
1717
This module can be used escalate privileges if the IMPERSONATION privilege has been
1818
assigned to the user. In most cases, this results in additional data access, but in

modules/auxiliary/admin/mssql/mssql_escalate_execute_as_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Microsoft SQL Server - SQLi Escalate Execute As',
16+
'Name' => 'Microsoft SQL Server SQLi Escalate Execute As',
1717
'Description' => %q{
1818
This module can be used escalate privileges if the IMPERSONATION privilege has been
1919
assigned to the user via error based SQL injection. In most cases, this results in

modules/auxiliary/admin/mssql/mssql_findandsampledata.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'Microsoft SQL Server - Find and Sample Data',
17+
'Name' => 'Microsoft SQL Server Find and Sample Data',
1818
'Description' => %q{This script will search through all of the non-default databases
1919
on the SQL Server for columns that match the keywords defined in the TSQL KEYWORDS
2020
option. If column names are found that match the defined keywords and data is present

modules/auxiliary/admin/mssql/mssql_idf.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
2121

2222
def initialize(info = {})
2323
super(update_info(info,
24-
'Name' => 'Microsoft SQL Server - Interesting Data Finder',
24+
'Name' => 'Microsoft SQL Server Interesting Data Finder',
2525
'Description' => %q{
2626
This module will search the specified MSSQL server for
2727
'interesting' columns and data.

modules/auxiliary/admin/mssql/mssql_ntlm_stealer_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ class Metasploit3 < Msf::Auxiliary
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'Microsoft SQL Server NTLM Stealer - SQLi',
14+
'Name' => 'Microsoft SQL Server NTLM Stealer via SQLi',
1515
'Description' => %q{
1616
This module can be used to help capture or relay the LM/NTLM credentials of the
1717
account running the remote SQL Server service. The module will use the SQL

0 commit comments

Comments
 (0)