diff --git a/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb b/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb index cb1d120b91..1564b26810 100644 --- a/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb +++ b/modules/exploits/windows/browser/ms10_046_shortcut_icon_dllloader.rb @@ -445,10 +445,8 @@ class Metasploit3 < Msf::Exploit::Remote raise RuntimeError, 'Using WebDAV requires SRVPORT=80 and URIPATH=/' end - print_status("") print_status("Send vulnerable clients to #{@exploit_unc}.") print_status("Or, get clients to save and render the icon of http:///.lnk") - print_status("") super end diff --git a/modules/exploits/windows/browser/webdav_dll_hijacker.rb b/modules/exploits/windows/browser/webdav_dll_hijacker.rb index 18d06b62e1..48bb4b77bb 100644 --- a/modules/exploits/windows/browser/webdav_dll_hijacker.rb +++ b/modules/exploits/windows/browser/webdav_dll_hijacker.rb @@ -371,9 +371,7 @@ class Metasploit3 < Msf::Exploit::Remote raise RuntimeError, 'Using WebDAV requires SRVPORT=80 and URIPATH=/' end - print_status("") print_status("Exploit links are now available at #{@exploit_unc}#{datastore['SHARENAME']}\\") - print_status("") super end