mirror of
https://github.com/rapid7/metasploit-payloads
synced 2024-12-08 23:33:07 +01:00
Tidy output
This commit is contained in:
parent
d0822e5f19
commit
36b0aeeeaa
@ -19,4 +19,4 @@ extern "C"
|
||||
MAKE_CUSTOM_TLV( \
|
||||
TLV_META_TYPE_STRING, \
|
||||
TLV_TYPE_EXTENSION_MIMIKATZ, \
|
||||
1)
|
||||
TLV_EXTENSIONS + 1)
|
@ -242,9 +242,9 @@ bool mod_mimikatz_sekurlsa::getLogonData(vector<wstring> * mesArguments, vector<
|
||||
{
|
||||
if(sessionData->LogonType != Network)
|
||||
{
|
||||
(*outputStream) <<
|
||||
sessions[i].HighPart << L";" << sessions[i].LowPart << L"," <<
|
||||
mod_text::stringOfSTRING(sessionData->AuthenticationPackage) << L",\"" <<
|
||||
(*outputStream) << "\"" <<
|
||||
sessions[i].HighPart << L";" << sessions[i].LowPart << L"\",\"" <<
|
||||
mod_text::stringOfSTRING(sessionData->AuthenticationPackage) << L"\",\"" <<
|
||||
mod_text::stringOfSTRING(sessionData->UserName) << L"\",\"" <<
|
||||
mod_text::stringOfSTRING(sessionData->LogonDomain) << L"\",\"";
|
||||
|
||||
|
@ -37,7 +37,7 @@ wstring mod_text::stringOrHex(const BYTE monTab[], DWORD maTaille, DWORD longueu
|
||||
else
|
||||
{
|
||||
if(ligne)
|
||||
result.assign(L"\n");
|
||||
//result.assign(L"\n");
|
||||
result.append(stringOfHex(monTab, maTaille, longueur));
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user