From eeff29167ac61c803fca967ed79be72aa8e88a98 Mon Sep 17 00:00:00 2001 From: Brendan Coles Date: Sat, 1 Dec 2018 07:06:03 +0000 Subject: [PATCH] Land #11044, Add pretty 'authenticating' message to MS17-010 modules --- modules/auxiliary/admin/smb/ms17_010_command.rb | 3 +++ modules/exploits/windows/smb/ms17_010_psexec.rb | 3 +++ 2 files changed, 6 insertions(+) diff --git a/modules/auxiliary/admin/smb/ms17_010_command.rb b/modules/auxiliary/admin/smb/ms17_010_command.rb index 1297723c4a..e866c39653 100644 --- a/modules/auxiliary/admin/smb/ms17_010_command.rb +++ b/modules/auxiliary/admin/smb/ms17_010_command.rb @@ -71,6 +71,9 @@ class MetasploitModule < Msf::Auxiliary def run_host(ip) begin + if datastore['SMBUser'].present? + print_status("Authenticating to #{ip} as user '#{splitname(datastore['SMBUser'])}'...") + end eternal_pwn(ip) # exploit Admin session smb_pwn(ip) # psexec diff --git a/modules/exploits/windows/smb/ms17_010_psexec.rb b/modules/exploits/windows/smb/ms17_010_psexec.rb index 535f0fd107..e0eb44b5ba 100644 --- a/modules/exploits/windows/smb/ms17_010_psexec.rb +++ b/modules/exploits/windows/smb/ms17_010_psexec.rb @@ -102,6 +102,9 @@ class MetasploitModule < Msf::Exploit::Remote def exploit begin + if datastore['SMBUser'].present? + print_status("Authenticating to #{datastore['RHOSTS']} as user '#{splitname(datastore['SMBUser'])}'...") + end eternal_pwn(datastore['RHOST']) smb_pwn()