modules/auxiliary/scanner/sap/sap_smb_relay.rb
Method run_mmr
has 37 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_mmr
begin
smb_uri = "\\\\#{datastore['LHOST']}\\#{Rex::Text.rand_text_alpha_lower(7)}.#{Rex::Text.rand_text_alpha_lower(3)}"
if datastore['HttpUsername'].empty?
Method initialize
has 35 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize
super(
'Name' => 'SAP SMB Relay Abuse',
'Description' => %q{
This module exploits provides several SMB Relay abuse through different SAP
Method send_soap_rfc_request
has 30 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def send_soap_rfc_request(data, smb_uri)
if not valid_credentials?
vprint_error("#{rhost}:#{rport} - Credentials needed in order to abuse the SAP SOAP RFC service")
return
end
Method run_xmla
has 29 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def run_xmla
if not valid_credentials?
vprint_error("#{rhost}:#{rport} - Credentials needed in order to abuse the SAP BW service")
return