Add authenticating... message
parent
a635e36d12
commit
8047bf2b09
|
@ -71,6 +71,9 @@ class MetasploitModule < Msf::Auxiliary
|
||||||
def run_host(ip)
|
def run_host(ip)
|
||||||
|
|
||||||
begin
|
begin
|
||||||
|
if datastore['SMBUser'].present?
|
||||||
|
print_status("Authenticating to #{ip} as user '#{splitname(datastore['SMBUser'])}'...")
|
||||||
|
end
|
||||||
eternal_pwn(ip) # exploit Admin session
|
eternal_pwn(ip) # exploit Admin session
|
||||||
smb_pwn(ip) # psexec
|
smb_pwn(ip) # psexec
|
||||||
|
|
||||||
|
|
|
@ -102,6 +102,9 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
begin
|
begin
|
||||||
|
if datastore['SMBUser'].present?
|
||||||
|
print_status("Authenticating to #{datastore['RHOSTS']} as user '#{splitname(datastore['SMBUser'])}'...")
|
||||||
|
end
|
||||||
eternal_pwn(datastore['RHOST'])
|
eternal_pwn(datastore['RHOST'])
|
||||||
smb_pwn()
|
smb_pwn()
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue