From 309923605980653f07346b7db0fd7114a8e48c76 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Tue, 1 May 2012 12:47:55 -0500 Subject: [PATCH] We no longer have to print the client's IP, because it's now a built-in feature. --- modules/exploits/windows/browser/vlc_mms_bof.rb | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/modules/exploits/windows/browser/vlc_mms_bof.rb b/modules/exploits/windows/browser/vlc_mms_bof.rb index f1c09f0d33..92fbe8501b 100644 --- a/modules/exploits/windows/browser/vlc_mms_bof.rb +++ b/modules/exploits/windows/browser/vlc_mms_bof.rb @@ -27,7 +27,6 @@ class Metasploit3 < Msf::Exploit::Remote The module only targets IE6 and IE7 because no DEP/ASLR bypass has been provided. }, 'License' => MSF_LICENSE, - 'Version' => "$Revision: $", 'Author' => [ 'Florent Hochwelker', # aka TaPiOn, Vulnerability discovery @@ -95,7 +94,7 @@ class Metasploit3 < Msf::Exploit::Remote #Default target my_target = target - vprint_status("#{cli.peerhost.ljust(16)} #{self.shortname} User-Agent: #{request.headers['User-Agent']}") + vprint_status("User-Agent: #{request.headers['User-Agent']}") if target.name == 'Automatic' agent = request.headers['User-Agent'] @@ -118,12 +117,12 @@ class Metasploit3 < Msf::Exploit::Remote #Pick the right target my_target = get_target(cli, request) if my_target.nil? - vprint_error("#{cli.peerhost.ljust(16)} #{self.shortname} Target not supported") + vprint_error("Target not supported") send_not_found(cli) return end - vprint_status("#{cli.peerhost.ljust(16)} #{self.shortname} URL: #{request.uri.to_s}") + vprint_status("URL: #{request.uri.to_s}") #ARCH used by the victim machine arch = Rex::Arch.endian(my_target.arch) @@ -209,7 +208,7 @@ class Metasploit3 < Msf::Exploit::Remote #Remove extra tabs in HTML html = html.gsub(/^\t\t/, "") - print_status("#{cli.peerhost.ljust(16)} #{self.shortname} Sending malicious page") + print_status("Sending malicious page") send_response( cli, html, {'Content-Type' => 'text/html'} ) end end