More print_status -> print_good

bug/bundler_fix
g0tmi1k 2017-07-19 11:39:15 +01:00
parent b8d80d87f1
commit df9b642746
20 changed files with 23 additions and 23 deletions

View File

@ -117,7 +117,7 @@ class MetasploitModule < Msf::Auxiliary
fail_with(Failure::Unknown, 'Could not resolve database server hostname.')
end
print_status("Stored SQL credentials #{username}:#{password} for #{matches.captures[2]}")
print_good("Stored SQL credentials #{username}:#{password} for #{matches.captures[2]}")
return
end
else

View File

@ -448,7 +448,7 @@ class MetasploitModule < Msf::Auxiliary
if (save_loot=="yes")
filename= "#{datastore['RHOST']}-#{datastore['RPORT']}_sqlserver_query_results.csv"
path = store_loot("mssql.data", "text/plain", datastore['RHOST'], sql_data_tbl.to_csv, filename, "SQL Server query results",this_service)
print_status("Query results have been saved to: #{path}")
print_good("Query results have been saved to: #{path}")
end
end

View File

@ -87,7 +87,7 @@ class MetasploitModule < Msf::Auxiliary
user: "#{datastore['SID']}/#{datastore['DBUSER']}",
password: datastore['DBPASS']
)
print_status("Found user/pass of: #{datastore['DBUSER']}/#{datastore['DBPASS']} on #{datastore['RHOST']} with sid #{datastore['SID']}")
print_good("Found user/pass of: #{datastore['DBUSER']}/#{datastore['DBPASS']} on #{datastore['RHOST']} with sid #{datastore['SID']}")
end
end
end

View File

@ -60,7 +60,7 @@ class MetasploitModule < Msf::Auxiliary
end
def print_target_info(cli, target_info)
print_status("#{cli.peerhost} - We have found the following interesting information:")
print_good("#{cli.peerhost} - We have found the following interesting information:")
report_host_info(target_info)
ignore_items!(target_info)
target_info.each_pair do |key, value|

View File

@ -35,7 +35,7 @@ class MetasploitModule < Msf::Auxiliary
if info[:excsatrd]
inst,plat,ver,pta = info[:instance_name],info[:platform],info[:version],info[:plaintext_auth]
report_info = "Platform: #{plat}, Version: #{ver}, Instance: #{inst}, Plain-Authentication: #{pta ? "OK" : "NO"}"
print_status("#{ip}:#{rport} DB2 - #{report_info}")
print_good("#{ip}:#{rport} DB2 - #{report_info}")
report_service(
:host => rhost,
:port => rport,

View File

@ -54,7 +54,7 @@ class MetasploitModule < Msf::Auxiliary
:info => "#{res[2]}_#{res[1]}"
)
print_status("Host #{ip} node name is " + res[2] + " with a product id of " + res[1] )
print_good("Host #{ip} node name is " + res[2] + " with a product id of " + res[1] )
rescue ::Rex::ConnectionError
rescue ::Errno::EPIPE

View File

@ -125,7 +125,7 @@ class MetasploitModule < Msf::Auxiliary
end
report_service(conf)
print_status("Discovered #{data[:app]} on #{k} (#{data[:info]})")
print_good("Discovered #{data[:app]} on #{k} (#{data[:info]})")
end
end
@ -355,7 +355,7 @@ class MetasploitModule < Msf::Auxiliary
:info => inf
)
print_status("Discovered #{app} on #{pkt[1]}:#{pkt[2]} (#{inf})")
print_good("Discovered #{app} on #{pkt[1]}:#{pkt[2]} (#{inf})")
end

View File

@ -89,7 +89,7 @@ class MetasploitModule < Msf::Auxiliary
end
report_service(conf)
print_status("Discovered #{data[:app]} on #{k} (#{data[:info]})")
print_good("Discovered #{data[:app]} on #{k} (#{data[:info]})")
end
end

View File

@ -127,7 +127,7 @@ class MetasploitModule < Msf::Auxiliary
version = data[offset..-1].unpack('Z*')[0]
report_service(:host => rhost, :port => rport, :name => "mysql", :info => version)
short_version = version.split('-')[0]
vprint_status "#{rhost}:#{rport} - Found remote MySQL version #{short_version}"
vprint_good "#{rhost}:#{rport} - Found remote MySQL version #{short_version}"
int_version(short_version) >= int_version(target)
end

View File

@ -128,7 +128,7 @@ class MetasploitModule < Msf::Auxiliary
create_credential_login(login_data.merge(service_data))
end
print_status("Hash Table has been saved")
print_good("Hash Table has been saved")
end

View File

@ -45,7 +45,7 @@ class MetasploitModule < Msf::Auxiliary
=end
report_service(:host => rhost, :port => rport, :name => "pcanywhere_data", :info => "")
print_status("#{rhost}:#{rport} pcAnywhere data service")
print_good("#{rhost}:#{rport} pcAnywhere data service")
rescue ::Rex::ConnectionError, ::EOFError, ::Errno::ECONNRESET
rescue ::Exception => e

View File

@ -54,7 +54,7 @@ class MetasploitModule < Msf::Auxiliary
report_service(:host => ip, :port => datastore['RPORT'], :proto => 'udp', :name => "pcanywhere_stat", :info => info)
report_note(:host => ip, :port => datastore['RPORT'], :proto => 'udp', :name => "pcanywhere_stat", :update => :unique, :ntype => "pcanywhere.status", :data => data )
print_status("#{ip}:#{datastore['RPORT']} #{info}")
print_good("#{ip}:#{datastore['RPORT']} #{info}")
end
end

View File

@ -77,7 +77,7 @@ class MetasploitModule < Msf::Auxiliary
}
)
if s
print_status("#{ip}:#{port} - TCP OPEN")
print_good("#{ip}:#{port} - TCP OPEN")
r << [ip,port,"open"]
end
rescue ::Rex::ConnectionRefused

View File

@ -103,7 +103,7 @@ class MetasploitModule < Msf::Auxiliary
proof: arg
)
print_status("FTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
print_good("FTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
end
@state[c][:pass] = data.strip

View File

@ -224,7 +224,7 @@ class MetasploitModule < Msf::Auxiliary
:data => req.resource.to_s,
:update => :unique_data
)
print_status("HTTP LOGIN #{cli.peerhost} > #{hhead}:#{@myport} #{user} / #{pass} => #{req.resource}")
print_good("HTTP LOGIN #{cli.peerhost} > #{hhead}:#{@myport} #{user} / #{pass} => #{req.resource}")
end

View File

@ -162,9 +162,9 @@ class MetasploitModule < Msf::Auxiliary
elsif info[:username] and info[:response]
mysql_send_error(c, "Access denied for user '#{info[:username]}'@'#{c.peerhost}' (using password: YES)")
if info[:database]
print_status("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}; Database: #{info[:database]}")
print_good("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}; Database: #{info[:database]}")
else
print_status("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}")
print_good("#{@state[c][:name]} - User: #{info[:username]}; Challenge: #{@challenge.unpack('H*')[0]}; Response: #{info[:response].unpack('H*')[0]}")
end
hash_line = "#{info[:username]}:$mysql$#{@challenge.unpack("H*")[0]}$#{info[:response].unpack('H*')[0]}"

View File

@ -100,7 +100,7 @@ class MetasploitModule < Msf::Auxiliary
password: @state[c][:pass],
proof: arg
)
print_status("POP3 LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
print_good("POP3 LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
@state[c][:pass] = data.strip
c.put "+OK\r\n"
return

View File

@ -105,7 +105,7 @@ class MetasploitModule < Msf::Auxiliary
password: @state[c][:password],
proof: @state[c][:database]
)
print_status("PostgreSQL LOGIN #{@state[c][:name]} #{@state[c][:username]} / #{@state[c][:password]} / #{@state[c][:database]}")
print_good("PostgreSQL LOGIN #{@state[c][:name]} #{@state[c][:username]} / #{@state[c][:password]} / #{@state[c][:database]}")
# send failure message
sdata = [ 0x45, 97 - 8 + @state[c][:username].length].pack("CN")
sdata << "SFATAL"

View File

@ -121,7 +121,7 @@ class MetasploitModule < Msf::Auxiliary
password: @state[c][:pass],
proof: arg
)
print_status("SMTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
print_good("SMTP LOGIN #{@state[c][:name]} #{@state[c][:user]} / #{@state[c][:pass]}")
end
c.put "503 Server Error\r\n"

View File

@ -264,11 +264,11 @@ class MetasploitModule < Msf::Auxiliary
nil,
"OpenSSL Heartbleed client memory"
)
print_status("#{@state[c][:name]} Heartbeat data stored in #{path}")
print_good("#{@state[c][:name]} Heartbeat data stored in #{path}")
rescue ::Interrupt
raise $!
rescue ::Exception
print_status("#{@state[c][:name]} Heartbeat data could not be stored: #{$!.class} #{$!}")
print_error("#{@state[c][:name]} Heartbeat data could not be stored: #{$!.class} #{$!}")
end
# Report the memory disclosure as a vulnerability on the host