File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/post/windows/gather/credentials Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -21,9 +21,9 @@ def initialize(info = {})
21
21
'Name' => 'McAfee Virus Scan Enterprise Password Hashes Dump' ,
22
22
'Description' => %q(
23
23
This module extracts the password hash from McAfee Virus Scan Enterprise (VSE)
24
- used to lock down the user interface. Hashcat supports cracking this type of
25
- hash using hash type sha1($salt.unicode($pass)) (-m 140) and a hex salt
26
- (--hex-salt) of 01000f000d003300 (unicode "\x01\x0f\x0d\x33"). A dynamic
24
+ used to lock down the user interface. Hashcat supports cracking this type of
25
+ hash using hash type sha1($salt.unicode($pass)) (-m 140) and a hex salt
26
+ (--hex-salt) of 01000f000d003300 (unicode "\x01\x0f\x0d\x33"). A dynamic
27
27
format is available for John the Ripper at the referenced URL.
28
28
) ,
29
29
'License' => MSF_LICENSE ,
You can’t perform that action at this time.
0 commit comments