@@ -28,7 +28,7 @@ def initialize
28
28
'SecureState R&D Team' ,
29
29
'sinn3r' ,
30
30
'Brandon Knight' ,
31
- 'Pete Arzamendi -> Outlook 2013 updates'
31
+ 'Pete (Bokojan) Arzamendi, # Outlook 2013 updates'
32
32
] ,
33
33
34
34
'License' => MSF_LICENSE ,
@@ -71,16 +71,18 @@ def initialize
71
71
}
72
72
]
73
73
] ,
74
- 'DefaultAction' => 'OWA_2010'
74
+ 'DefaultAction' => 'OWA_2010' ,
75
+ 'DefaultOptions' => {
76
+ 'SSL' => true
77
+ }
75
78
)
76
79
77
- 'DefaultOptions' => { 'SSL' => true }
78
80
79
81
register_options (
80
82
[
81
83
OptInt . new ( 'RPORT' , [ true , "The target port" , 443 ] ) ,
82
84
OptAddress . new ( 'RHOST' , [ true , "The target address" , true ] ) ,
83
- OptBool . new ( 'ENUM_DOMAIN' , [ true , "Automatically enumerate AD domain using NTLM authentication" , false ] ) ,
85
+ OptBool . new ( 'ENUM_DOMAIN' , [ true , "Automatically enumerate AD domain using NTLM authentication" , true ] ) ,
84
86
] , self . class )
85
87
86
88
@@ -225,14 +227,8 @@ def try_user_pass(opts)
225
227
226
228
#No password change required moving on.
227
229
reason = res . headers [ 'location' ] . split ( 'reason=' ) [ 1 ]
228
- if reason == nil
229
- #Get cdata auth cookies from headers. Wookie
230
- cadata_cookies = res . headers [ 'set-cookie' ] . scan ( /cadata.*?=.*?;/ )
231
- cookieMonster = ""
232
- cadata_cookies . each do | cookie |
233
- cookieMonster += cookie . to_s
234
- end
235
- headers [ 'Cookie' ] = 'PBack=0;' << cookieMonster
230
+ if reason == nil
231
+ headers [ 'Cookie' ] = 'PBack=0;' << res . get_cookies
236
232
else
237
233
#Login didn't work. no point on going on.
238
234
vprint_error ( "#{ msg } FAILED LOGIN. '#{ user } ' : '#{ pass } '" )
0 commit comments