We no longer have to print the client's IP, because it's now a built-in feature.
parent
094e7d0327
commit
3099236059
|
@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
The module only targets IE6 and IE7 because no DEP/ASLR bypass has been provided.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => "$Revision: $",
|
||||
'Author' =>
|
||||
[
|
||||
'Florent Hochwelker', # aka TaPiOn, Vulnerability discovery
|
||||
|
@ -95,7 +94,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#Default target
|
||||
my_target = target
|
||||
|
||||
vprint_status("#{cli.peerhost.ljust(16)} #{self.shortname} User-Agent: #{request.headers['User-Agent']}")
|
||||
vprint_status("User-Agent: #{request.headers['User-Agent']}")
|
||||
|
||||
if target.name == 'Automatic'
|
||||
agent = request.headers['User-Agent']
|
||||
|
@ -118,12 +117,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#Pick the right target
|
||||
my_target = get_target(cli, request)
|
||||
if my_target.nil?
|
||||
vprint_error("#{cli.peerhost.ljust(16)} #{self.shortname} Target not supported")
|
||||
vprint_error("Target not supported")
|
||||
send_not_found(cli)
|
||||
return
|
||||
end
|
||||
|
||||
vprint_status("#{cli.peerhost.ljust(16)} #{self.shortname} URL: #{request.uri.to_s}")
|
||||
vprint_status("URL: #{request.uri.to_s}")
|
||||
|
||||
#ARCH used by the victim machine
|
||||
arch = Rex::Arch.endian(my_target.arch)
|
||||
|
@ -209,7 +208,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#Remove extra tabs in HTML
|
||||
html = html.gsub(/^\t\t/, "")
|
||||
|
||||
print_status("#{cli.peerhost.ljust(16)} #{self.shortname} Sending malicious page")
|
||||
print_status("Sending malicious page")
|
||||
send_response( cli, html, {'Content-Type' => 'text/html'} )
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue