diff --git a/modules/auxiliary/scanner/smb/smb_login.rb b/modules/auxiliary/scanner/smb/smb_login.rb index d3d1539f99..0bb6eb9939 100644 --- a/modules/auxiliary/scanner/smb/smb_login.rb +++ b/modules/auxiliary/scanner/smb/smb_login.rb @@ -85,13 +85,13 @@ class MetasploitModule < Msf::Auxiliary bogus_result = @scanner.attempt_bogus_login(domain) if bogus_result.success? if bogus_result.access_level == Metasploit::Framework::LoginScanner::SMB::AccessLevels::GUEST - print_status("This system allows guest sessions with any credentials") + print_status("This system allows guest sessions with random credentials") else - print_error("This system accepts authentication with any credentials, brute force is ineffective.") + print_error("This system accepts authentication with random credentials, brute force is ineffective.") return end else - vprint_status('This system does not accept authentication with any credentials, proceeding with brute force') + vprint_status('This system does not accept authentication with random credentials, proceeding with brute force') end end