Uses peer instead of ip:port across all the module
parent
447c4ee7df
commit
6d01d7f986
|
@ -60,7 +60,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
if check_host(ip) == Exploit::CheckCode::Vulnerable
|
||||
dos_host(ip)
|
||||
else
|
||||
print_status("#{ip}:#{rport} - Probably not vulnerable, will not dos it.")
|
||||
print_status("#{peer} - Probably not vulnerable, will not dos it.")
|
||||
end
|
||||
end
|
||||
|
||||
|
@ -76,17 +76,17 @@ class Metasploit3 < Msf::Auxiliary
|
|||
res = send_request_raw('uri' => uri)
|
||||
|
||||
unless res
|
||||
vprint_error("#{ip}:#{rport} - Connection timed out")
|
||||
vprint_error("#{peer} - Connection timed out")
|
||||
return file_size
|
||||
end
|
||||
|
||||
if res.code == 404
|
||||
vprint_error("#{ip}:#{rport} - You got a 404. URI must be a valid resource.")
|
||||
vprint_error("#{peer} - You got a 404. URI must be a valid resource.")
|
||||
return file_size
|
||||
end
|
||||
|
||||
file_size = res.body.length
|
||||
vprint_status("#{ip}:#{rport} - File length: #{file_size} bytes")
|
||||
vprint_status("#{peer} - File length: #{file_size} bytes")
|
||||
|
||||
return file_size
|
||||
}.call
|
||||
|
@ -112,7 +112,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
rescue ::Errno::EPIPE, ::Timeout::Error
|
||||
# Same exceptions the HttpClient mixin catches
|
||||
end
|
||||
print_status("#{ip}:#{rport} - DOS request sent")
|
||||
print_status("#{peer} - DOS request sent")
|
||||
end
|
||||
|
||||
def potential_static_files_uris
|
||||
|
|
Loading…
Reference in New Issue