verbose response.

MS-2855/keylogger-mettle-extension
Austin 2017-11-15 12:27:40 -05:00 committed by GitHub
parent 4918e5856d
commit 829a7a53db
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 3 deletions

View File

@ -17,7 +17,7 @@ class MetasploitModule < Msf::Exploit::Remote
attacker to execute arbitrary payloads with telnet or openssl.
},
'Author' => [
'Mumbai', # https://github.com/realoriginal (module)
'Mumbai', #
'staaldraad', # https://twitter.com/_staaldraad/
'Paul Haas <Paul [dot] Haas [at] Security-Assessment.com>', # took some of the code from polycom_hdx_auth_bypass
'h00die <mike@shorebreaksecurity.com>' # stole the code, creds to them
@ -73,7 +73,8 @@ class MetasploitModule < Msf::Exploit::Remote
sock = connect
Rex.sleep(2)
banner = sock.get_once
vprint_status("Received : #{banner}")
vprint_status("Recieved #{banner.length} bytes from service")
vprint_line("#{banner}")
if banner =~ /password/
print_status("Authentication enabled on device, authenticating with target...")
if datastore['PASSWORD'].nil?
@ -109,7 +110,9 @@ class MetasploitModule < Msf::Exploit::Remote
sock.put(cmd)
if datastore['VERBOSE']
Rex.sleep(2)
vprint_status(sock.get_once)
resp = sock.get_once
vprint_status("Recieved #{resp.length} bytes in response")
vprint_line(resp)
end
# Give time for our command to be queued and executed