From 7b866eee867667533f10eb772e7248c97f718997 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Fri, 27 Jan 2012 12:50:01 -0600 Subject: [PATCH] Use the proper function for verbose prints --- modules/exploits/windows/browser/vlc_amv.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/browser/vlc_amv.rb b/modules/exploits/windows/browser/vlc_amv.rb index 39e08d71b0..5b31bfe12d 100644 --- a/modules/exploits/windows/browser/vlc_amv.rb +++ b/modules/exploits/windows/browser/vlc_amv.rb @@ -78,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote #Default target my_target = target - print_status("User-Agent: #{request.headers['User-Agent']}") if datastore['VERBOSE'] + vprint_status("User-Agent: #{request.headers['User-Agent']}") if target.name == 'Automatic' agent = request.headers['User-Agent'] @@ -126,12 +126,12 @@ class Metasploit3 < Msf::Exploit::Remote #Pick the right target my_target = get_target(cli, request) if my_target.nil? - print_error("Target not supported") if datastore['VERBOSE'] + vprint_error("Target not supported") send_not_found(cli) return end - print_status("URL: #{request.uri.to_s}") if datastore['VERBOSE'] + vprint_status("URL: #{request.uri.to_s}") #Send the trigger file upon request if request.uri.match(/\.amv/)