Skip to content

Commit c52104e

Browse files
committed
Beautify metadata
1 parent fcb4bea commit c52104e

File tree

1 file changed

+21
-17
lines changed

1 file changed

+21
-17
lines changed

modules/auxiliary/admin/mssql/mssql_enum_windows_domain_accounts.rb

Lines changed: 21 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -13,24 +13,28 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration',
17-
'Description' => %q{
18-
This module can be used to brute force RIDs associated with the domain of
19-
the SQL Server using the SUSER_SNAME function. This is similar to the
20-
smb_lookupsid module, but executed through SQL Server queries as any user
21-
with the PUBLIC role (everyone). Information that can be enumerated includes
22-
Windows domain users, groups, and computer accounts. Enumerated accounts can
23-
then be used in online dictionary attacks.
24-
},
25-
'Author' => [ 'nullbind <scott.sutherland[at]netspi.com>','antti <antti.rantasaari[at]netspi.com>'],
26-
'License' => MSF_LICENSE,
27-
'References' => [[ 'URL','http://msdn.microsoft.com/en-us/library/ms174427.aspx']]
28-
))
29-
30-
register_options(
16+
'Name' => 'Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration',
17+
'Description' => %q{
18+
This module can be used to brute force RIDs associated with the domain of
19+
the SQL Server using the SUSER_SNAME function. This is similar to the
20+
smb_lookupsid module, but executed through SQL Server queries as any user
21+
with the PUBLIC role (everyone). Information that can be enumerated includes
22+
Windows domain users, groups, and computer accounts. Enumerated accounts can
23+
then be used in online dictionary attacks.
24+
},
25+
'Author' =>
3126
[
32-
OptInt.new('FuzzNum', [true, 'Number of principal_ids to fuzz.', 10000]),
33-
], self.class)
27+
'nullbind <scott.sutherland[at]netspi.com>',
28+
'antti <antti.rantasaari[at]netspi.com>'
29+
],
30+
'License' => MSF_LICENSE,
31+
'References' => [[ 'URL','http://msdn.microsoft.com/en-us/library/ms174427.aspx']]
32+
))
33+
34+
register_options(
35+
[
36+
OptInt.new('FuzzNum', [true, 'Number of principal_ids to fuzz.', 10000]),
37+
], self.class)
3438
end
3539

3640
def run

0 commit comments

Comments
 (0)