From 3c73133a44c312ce44d95da8b70b124f3bd34691 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Wed, 13 Jun 2012 13:33:36 -0500 Subject: [PATCH] Fixing up mysql module text --- .../auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb index 866ddd6dcc..b1f460bce7 100644 --- a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb @@ -20,14 +20,14 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'MYSQL CVE-2012-2122 Authentication Bypass Password Dump', + 'Name' => 'MySQL Authentication Bypass Password Dump', 'Version' => '$Revision$', 'Description' => %Q{ This module exploits a password bypass vulnerability in MySQL in order to extract the usernames and encrypted password hashes from a MySQL server. These hashes ares stored as loot for later cracking. }, - 'Authors' => [ + 'Author' => [ 'TheLightCosine ', # Original hashdump module 'jcran' # Authentication bypass bruteforce implementation ], @@ -164,7 +164,7 @@ class Metasploit3 < Msf::Auxiliary if results.length > 0 - print_good("#{rhost}:#{rport} Successful exploited the authentication bypass flaw, dumping hashes...") + print_good("#{rhost}:#{rport} Successfully exploited the authentication bypass flaw, dumping hashes...") @mysql_handle = results.first return dump_hashes end