Small changes

bug/bundler_fix
xistence 2015-09-13 08:31:19 +07:00
parent 79e3a7f84b
commit 521636a016
1 changed files with 7 additions and 7 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
super( super(
'Name' => 'Portmap Amplification Scanner', 'Name' => 'Portmap Amplification Scanner',
'Description' => %q{ 'Description' => %q{
This module can be used to discover Portmap servers which expose unauthicated This module can be used to discover Portmap servers which expose unauthenticated
functionality that can be used in an amplication attack against a third party. functionality that can be used in an amplication attack against a third party.
}, },
'Author' => [ 'xistence <xistence[at]0x90.nl>'], # Original scanner module 'Author' => [ 'xistence <xistence[at]0x90.nl>'], # Original scanner module
@ -104,13 +104,13 @@ class Metasploit3 < Msf::Auxiliary
end end
def scanner_process(data, shost, sport) def scanner_process(data, shost, sport)
if data =~/#{XID_SUMMARY}\x00\x00\x00\x01/ if data =~ /#{XID_SUMMARY}\x00\x00\x00\x01/
@results_summary[shost] ||= [] @results_summary[shost] ||= []
@results_summary[shost] << data @results_summary[shost] << data
elsif data =~/#{XID_METRICS}\x00\x00\x00\x01/ elsif data =~ /#{XID_METRICS}\x00\x00\x00\x01/
@results_metrics[shost] ||= [] @results_metrics[shost] ||= []
@results_metrics[shost] << data @results_metrics[shost] << data
elsif data =~/#{XID_DUMP}\x00\x00\x00\x01/ elsif data =~ /#{XID_DUMP}\x00\x00\x00\x01/
@results_dump[shost] ||= [] @results_dump[shost] ||= []
@results_dump[shost] << data @results_dump[shost] << data
else else
@ -140,7 +140,7 @@ class Metasploit3 < Msf::Auxiliary
port: datastore['RPORT'], port: datastore['RPORT'],
proto: 'udp', proto: 'udp',
name: what, name: what,
refs: self.references refs: references
) )
else else
vprint_status("#{peer} - Not vulnerable to #{what}: #{proof}") vprint_status("#{peer} - Not vulnerable to #{what}: #{proof}")
@ -167,7 +167,7 @@ class Metasploit3 < Msf::Auxiliary
port: datastore['RPORT'], port: datastore['RPORT'],
proto: 'udp', proto: 'udp',
name: what, name: what,
refs: self.references refs: references
) )
else else
vprint_status("#{peer} - Not vulnerable to #{what}: #{proof}") vprint_status("#{peer} - Not vulnerable to #{what}: #{proof}")
@ -194,7 +194,7 @@ class Metasploit3 < Msf::Auxiliary
port: datastore['RPORT'], port: datastore['RPORT'],
proto: 'udp', proto: 'udp',
name: what, name: what,
refs: self.references refs: references
) )
else else
vprint_status("#{peer} - Not vulnerable to #{what}: #{proof}") vprint_status("#{peer} - Not vulnerable to #{what}: #{proof}")