More print_status -> print_good
parent
b8d80d87f1
commit
df9b642746
|
@ -117,7 +117,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
fail_with(Failure::Unknown, 'Could not resolve database server hostname.')
|
||||
end
|
||||
|
||||
print_status("Stored SQL credentials #{username}:#{password} for #{matches.captures[2]}")
|
||||
print_good("Stored SQL credentials #{username}:#{password} for #{matches.captures[2]}")
|
||||
return
|
||||
end
|
||||
else
|
||||
|
|
|
@ -448,7 +448,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
if (save_loot=="yes")
|
||||
filename= "#{datastore['RHOST']}-#{datastore['RPORT']}_sqlserver_query_results.csv"
|
||||
path = store_loot("mssql.data", "text/plain", datastore['RHOST'], sql_data_tbl.to_csv, filename, "SQL Server query results",this_service)
|
||||
print_status("Query results have been saved to: #{path}")
|
||||
print_good("Query results have been saved to: #{path}")
|
||||
end
|
||||
|
||||
end
|
||||
|
|
|
@ -87,7 +87,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
user: "#{datastore['SID']}/#{datastore['DBUSER']}",
|
||||
password: datastore['DBPASS']
|
||||
)
|
||||
print_status("Found user/pass of: #{datastore['DBUSER']}/#{datastore['DBPASS']} on #{datastore['RHOST']} with sid #{datastore['SID']}")
|
||||
print_good("Found user/pass of: #{datastore['DBUSER']}/#{datastore['DBPASS']} on #{datastore['RHOST']} with sid #{datastore['SID']}")
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -60,7 +60,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
end
|
||||
|
||||
def print_target_info(cli, target_info)
|
||||
print_status("#{cli.peerhost} - We have found the following interesting information:")
|
||||
print_good("#{cli.peerhost} - We have found the following interesting information:")
|
||||
report_host_info(target_info)
|
||||
ignore_items!(target_info)
|
||||
target_info.each_pair do |key, value|
|
||||
|
|
|
@ -35,7 +35,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
if info[:excsatrd]
|
||||
inst,plat,ver,pta = info[:instance_name],info[:platform],info[:version],info[:plaintext_auth]
|
||||
report_info = "Platform: #{plat}, Version: #{ver}, Instance: #{inst}, Plain-Authentication: #{pta ? "OK" : "NO"}"
|
||||
print_status("#{ip}:#{rport} DB2 - #{report_info}")
|
||||
print_good("#{ip}:#{rport} DB2 - #{report_info}")
|
||||
report_service(
|
||||
:host => rhost,
|
||||
:port => rport,
|
||||
|
|
|
@ -54,7 +54,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
:info => "#{res[2]}_#{res[1]}"
|
||||
)
|
||||
|
||||
print_status("Host #{ip} node name is " + res[2] + " with a product id of " + res[1] )
|
||||
print_good("Host #{ip} node name is " + res[2] + " with a product id of " + res[1] )
|
||||
|
||||
rescue ::Rex::ConnectionError
|
||||
rescue ::Errno::EPIPE
|
||||
|
|
|
@ -125,7 +125,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
end
|
||||
|
||||
report_service(conf)
|
||||
print_status("Discovered #{data[:app]} on #{k} (#{data[:info]})")
|
||||
print_good("Discovered #{data[:app]} on #{k} (#{data[:info]})")
|
||||
end
|
||||
end
|
||||
|
||||
|
@ -355,7 +355,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
:info => inf
|
||||
)
|
||||
|
||||
print_status("Discovered #{app} on #{pkt[1]}:#{pkt[2]} (#{inf})")
|
||||
print_good("Discovered #{app} on #{pkt[1]}:#{pkt[2]} (#{inf})")
|
||||
|
||||
end
|
||||
|
||||
|
|
|
@ -89,7 +89,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
end
|
||||
|
||||
report_service(conf)
|
||||
print_status("Discovered #{data[:app]} on #{k} (#{data[:info]})")
|
||||
print_good("Discovered #{data[:app]} on #{k} (#{data[:info]})")
|
||||
end
|
||||
end
|
||||
|
||||
|
|
|
@ -127,7 +127,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
version = data[offset..-1].unpack('Z*')[0]
|
||||
report_service(:host => rhost, :port => rport, :name => "mysql", :info => version)
|
||||
short_version = version.split('-')[0]
|
||||
vprint_status "#{rhost}:#{rport} - Found remote MySQL version #{short_version}"
|
||||
vprint_good "#{rhost}:#{rport} - Found remote MySQL version #{short_version}"
|
||||
int_version(short_version) >= int_version(target)
|
||||
end
|
||||
|
||||
|
|
|
@ -128,7 +128,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
|
||||
create_credential_login(login_data.merge(service_data))
|
||||
end
|
||||
print_status("Hash Table has been saved")
|
||||
print_good("Hash Table has been saved")
|
||||
end
|
||||
|
||||
|
||||
|
|
|
@ -45,7 +45,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
=end
|
||||
|
||||
report_service(:host => rhost, :port => rport, :name => "pcanywhere_data", :info => "")
|
||||
print_status("#{rhost}:#{rport} pcAnywhere data service")
|
||||
print_good("#{rhost}:#{rport} pcAnywhere data service")
|
||||
|
||||
rescue ::Rex::ConnectionError, ::EOFError, ::Errno::ECONNRESET
|
||||
rescue ::Exception => e
|
||||
|
|
|
@ -54,7 +54,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
|
||||
report_service(:host => ip, :port => datastore['RPORT'], :proto => 'udp', :name => "pcanywhere_stat", :info => info)
|
||||
report_note(:host => ip, :port => datastore['RPORT'], :proto => 'udp', :name => "pcanywhere_stat", :update => :unique, :ntype => "pcanywhere.status", :data => data )
|
||||
print_status("#{ip}:#{datastore['RPORT']} #{info}")
|
||||
print_good("#{ip}:#{datastore['RPORT']} #{info}")
|
||||
end
|
||||
end
|
||||
|
||||
|
|
|
@ -77,7 +77,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
}
|
||||
)
|
||||
if s
|
||||
print_status("#{ip}:#{port} - TCP OPEN")
|
||||
print_good("#{ip}:#{port} - TCP OPEN")
|
||||
r << [ip,port,"open"]
|
||||
end
|
||||
rescue ::Rex::ConnectionRefused
|
||||
|
|
|
@ -103,7 +103,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
proof: arg
|
||||
)
|
||||
|
||||
print_status("FTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
|
||||
print_good("FTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
|
||||
end
|
||||
|
||||
@state[c][:pass] = data.strip
|
||||
|
|
|
@ -224,7 +224,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
:data => req.resource.to_s,
|
||||
:update => :unique_data
|
||||
)
|
||||
print_status("HTTP LOGIN #{cli.peerhost} > #{hhead}:#{@myport} #{user} / #{pass} => #{req.resource}")
|
||||
print_good("HTTP LOGIN #{cli.peerhost} > #{hhead}:#{@myport} #{user} / #{pass} => #{req.resource}")
|
||||
end
|
||||
|
||||
|
||||
|
|
|
@ -162,9 +162,9 @@ class MetasploitModule < Msf::Auxiliary
|
|||
elsif info[:username] and info[:response]
|
||||
mysql_send_error(c, "Access denied for user '#{info[:username]}'@'#{c.peerhost}' (using password: YES)")
|
||||
if info[:database]
|
||||
print_status("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}; Database: #{info[:database]}")
|
||||
print_good("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}; Database: #{info[:database]}")
|
||||
else
|
||||
print_status("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}")
|
||||
print_good("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}")
|
||||
end
|
||||
hash_line = "#{info[:username]}:$mysql$#{@challenge.unpack("H*")[0]}$#{info[:response].unpack('H*')[0]}"
|
||||
|
||||
|
|
|
@ -100,7 +100,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
password: @state[c][:pass],
|
||||
proof: arg
|
||||
)
|
||||
print_status("POP3 LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
|
||||
print_good("POP3 LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
|
||||
@state[c][:pass] = data.strip
|
||||
c.put "+OK\r\n"
|
||||
return
|
||||
|
|
|
@ -105,7 +105,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
password: @state[c][:password],
|
||||
proof: @state[c][:database]
|
||||
)
|
||||
print_status("PostgreSQL LOGIN #{@state[c][:name]} #{@state[c][:username]} / #{@state[c][:password]} / #{@state[c][:database]}")
|
||||
print_good("PostgreSQL LOGIN #{@state[c][:name]} #{@state[c][:username]} / #{@state[c][:password]} / #{@state[c][:database]}")
|
||||
# send failure message
|
||||
sdata = [ 0x45, 97 - 8 + @state[c][:username].length].pack("CN")
|
||||
sdata << "SFATAL"
|
||||
|
|
|
@ -121,7 +121,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
password: @state[c][:pass],
|
||||
proof: arg
|
||||
)
|
||||
print_status("SMTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
|
||||
print_good("SMTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
|
||||
end
|
||||
|
||||
c.put "503 Server Error\r\n"
|
||||
|
|
|
@ -264,11 +264,11 @@ class MetasploitModule < Msf::Auxiliary
|
|||
nil,
|
||||
"OpenSSL Heartbleed client memory"
|
||||
)
|
||||
print_status("#{@state[c][:name]} Heartbeat data stored in #{path}")
|
||||
print_good("#{@state[c][:name]} Heartbeat data stored in #{path}")
|
||||
rescue ::Interrupt
|
||||
raise $!
|
||||
rescue ::Exception
|
||||
print_status("#{@state[c][:name]} Heartbeat data could not be stored: #{$!.class} #{$!}")
|
||||
print_error("#{@state[c][:name]} Heartbeat data could not be stored: #{$!.class} #{$!}")
|
||||
end
|
||||
|
||||
# Report the memory disclosure as a vulnerability on the host
|
||||
|
|
Loading…
Reference in New Issue