From 6d01d7f986cd0719558d44a0d4406b1c3b45c858 Mon Sep 17 00:00:00 2001 From: erwanlr Date: Thu, 28 May 2015 09:32:05 +0100 Subject: [PATCH] Uses peer instead of ip:port across all the module --- modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb index 354995434d..55265f2602 100644 --- a/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb +++ b/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb @@ -60,7 +60,7 @@ class Metasploit3 < Msf::Auxiliary if check_host(ip) == Exploit::CheckCode::Vulnerable dos_host(ip) else - print_status("#{ip}:#{rport} - Probably not vulnerable, will not dos it.") + print_status("#{peer} - Probably not vulnerable, will not dos it.") end end @@ -76,17 +76,17 @@ class Metasploit3 < Msf::Auxiliary res = send_request_raw('uri' => uri) unless res - vprint_error("#{ip}:#{rport} - Connection timed out") + vprint_error("#{peer} - Connection timed out") return file_size end if res.code == 404 - vprint_error("#{ip}:#{rport} - You got a 404. URI must be a valid resource.") + vprint_error("#{peer} - You got a 404. URI must be a valid resource.") return file_size end file_size = res.body.length - vprint_status("#{ip}:#{rport} - File length: #{file_size} bytes") + vprint_status("#{peer} - File length: #{file_size} bytes") return file_size }.call @@ -112,7 +112,7 @@ class Metasploit3 < Msf::Auxiliary rescue ::Errno::EPIPE, ::Timeout::Error # Same exceptions the HttpClient mixin catches end - print_status("#{ip}:#{rport} - DOS request sent") + print_status("#{peer} - DOS request sent") end def potential_static_files_uris