Use create_cracked_credential

bug/bundler_fix
jvazquez-r7 2015-05-21 16:30:42 -05:00
parent d564a85f6f
commit e1f10772b3
No known key found for this signature in database
GPG Key ID: 38D99152B9352D83
1 changed files with 10 additions and 16 deletions

View File

@ -180,7 +180,7 @@ class Metasploit3 < Msf::Auxiliary
# Write the rakp hash to the database # Write the rakp hash to the database
hash = "#{rhost} #{username}:$rakp$#{sha1_salt}$#{sha1_hash}" hash = "#{rhost} #{username}:$rakp$#{sha1_salt}$#{sha1_hash}"
report_hash(username, hash) core_id = report_hash(username, hash)
# Write the vulnerability to the database # Write the vulnerability to the database
unless reported_vuln unless reported_vuln
report_vuln( report_vuln(
@ -205,7 +205,7 @@ class Metasploit3 < Msf::Auxiliary
print_good("#{rhost}:#{rport} - IPMI - Hash for user '#{username}' matches password '#{pass}'") print_good("#{rhost}:#{rport} - IPMI - Hash for user '#{username}' matches password '#{pass}'")
# Report the clear-text credential to the database # Report the clear-text credential to the database
report_cracked_cred(username, pass) report_cracked_cred(username, pass, core_id)
break break
end end
end end
@ -269,24 +269,18 @@ class Metasploit3 < Msf::Auxiliary
status: Metasploit::Model::Login::Status::UNTRIED status: Metasploit::Model::Login::Status::UNTRIED
}.merge(service_data) }.merge(service_data)
create_credential_login(login_data) cl = create_credential_login(login_data)
cl.core_id
end end
def report_cracked_cred(user, password) def report_cracked_cred(user, password, core_id)
credential_data = { cred_data = {
module_fullname: self.fullname, core_id: core_id,
origin_type: :service,
private_data: password,
private_type: :password,
username: user, username: user,
}.merge(service_data) password: password
}
login_data = { create_cracked_credential(cred_data)
core: create_credential(credential_data),
status: Metasploit::Model::Login::Status::UNTRIED
}.merge(service_data)
create_credential_login(login_data)
end end
# #