Skip to content

Commit ecb74c5

Browse files
committed
Beautify description
1 parent c52104e commit ecb74c5

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

modules/auxiliary/admin/mssql/mssql_enum_windows_domain_accounts.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,11 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration',
1717
'Description' => %q{
18-
This module can be used to brute force RIDs associated with the domain of
19-
the SQL Server using the SUSER_SNAME function. This is similar to the
20-
smb_lookupsid module, but executed through SQL Server queries as any user
21-
with the PUBLIC role (everyone). Information that can be enumerated includes
22-
Windows domain users, groups, and computer accounts. Enumerated accounts can
23-
then be used in online dictionary attacks.
18+
This module can be used to brute force RIDs associated with the domain of the SQL Server
19+
using the SUSER_SNAME function. This is similar to the smb_lookupsid module, but executed
20+
through SQL Server queries as any user with the PUBLIC role (everyone). Information that
21+
can be enumerated includes Windows domain users, groups, and computer accounts. Enumerated
22+
accounts can then be used in online dictionary attacks.
2423
},
2524
'Author' =>
2625
[

0 commit comments

Comments
 (0)