Uses peer instead of ip:port across all the module
parent
447c4ee7df
commit
6d01d7f986
|
@ -60,7 +60,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
if check_host(ip) == Exploit::CheckCode::Vulnerable
|
if check_host(ip) == Exploit::CheckCode::Vulnerable
|
||||||
dos_host(ip)
|
dos_host(ip)
|
||||||
else
|
else
|
||||||
print_status("#{ip}:#{rport} - Probably not vulnerable, will not dos it.")
|
print_status("#{peer} - Probably not vulnerable, will not dos it.")
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -76,17 +76,17 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
res = send_request_raw('uri' => uri)
|
res = send_request_raw('uri' => uri)
|
||||||
|
|
||||||
unless res
|
unless res
|
||||||
vprint_error("#{ip}:#{rport} - Connection timed out")
|
vprint_error("#{peer} - Connection timed out")
|
||||||
return file_size
|
return file_size
|
||||||
end
|
end
|
||||||
|
|
||||||
if res.code == 404
|
if res.code == 404
|
||||||
vprint_error("#{ip}:#{rport} - You got a 404. URI must be a valid resource.")
|
vprint_error("#{peer} - You got a 404. URI must be a valid resource.")
|
||||||
return file_size
|
return file_size
|
||||||
end
|
end
|
||||||
|
|
||||||
file_size = res.body.length
|
file_size = res.body.length
|
||||||
vprint_status("#{ip}:#{rport} - File length: #{file_size} bytes")
|
vprint_status("#{peer} - File length: #{file_size} bytes")
|
||||||
|
|
||||||
return file_size
|
return file_size
|
||||||
}.call
|
}.call
|
||||||
|
@ -112,7 +112,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
rescue ::Errno::EPIPE, ::Timeout::Error
|
rescue ::Errno::EPIPE, ::Timeout::Error
|
||||||
# Same exceptions the HttpClient mixin catches
|
# Same exceptions the HttpClient mixin catches
|
||||||
end
|
end
|
||||||
print_status("#{ip}:#{rport} - DOS request sent")
|
print_status("#{peer} - DOS request sent")
|
||||||
end
|
end
|
||||||
|
|
||||||
def potential_static_files_uris
|
def potential_static_files_uris
|
||||||
|
|
Loading…
Reference in New Issue