1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-12-08 23:33:07 +01:00

Tidy output

This commit is contained in:
Meatballs 2013-04-20 12:21:48 +01:00
parent d0822e5f19
commit 36b0aeeeaa
3 changed files with 5 additions and 5 deletions

View File

@ -19,4 +19,4 @@ extern "C"
MAKE_CUSTOM_TLV( \
TLV_META_TYPE_STRING, \
TLV_TYPE_EXTENSION_MIMIKATZ, \
1)
TLV_EXTENSIONS + 1)

View File

@ -242,9 +242,9 @@ bool mod_mimikatz_sekurlsa::getLogonData(vector<wstring> * mesArguments, vector<
{
if(sessionData->LogonType != Network)
{
(*outputStream) <<
sessions[i].HighPart << L";" << sessions[i].LowPart << L"," <<
mod_text::stringOfSTRING(sessionData->AuthenticationPackage) << L",\"" <<
(*outputStream) << "\"" <<
sessions[i].HighPart << L";" << sessions[i].LowPart << L"\",\"" <<
mod_text::stringOfSTRING(sessionData->AuthenticationPackage) << L"\",\"" <<
mod_text::stringOfSTRING(sessionData->UserName) << L"\",\"" <<
mod_text::stringOfSTRING(sessionData->LogonDomain) << L"\",\"";

View File

@ -37,7 +37,7 @@ wstring mod_text::stringOrHex(const BYTE monTab[], DWORD maTaille, DWORD longueu
else
{
if(ligne)
result.assign(L"\n");
//result.assign(L"\n");
result.append(stringOfHex(monTab, maTaille, longueur));
}
}