When a blind SQL injection, it's a good thing (for the attacker), so we should use print_good
parent
ce16ab662c
commit
fa9d23d839
|
@ -228,8 +228,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
pinjd = detection_d(normalres,trueres,falseres,tarr)
|
||||
|
||||
if pinja or pinjb or pinjc or pinjd
|
||||
print_error("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
|
||||
print_error("[#{t}]")
|
||||
print_good("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
|
||||
print_good("[#{t}]")
|
||||
|
||||
report_web_vuln(
|
||||
:host => ip,
|
||||
|
@ -319,8 +319,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
pinjd = detection_d(normalres,trueres,falseres,tarr)
|
||||
|
||||
if pinja or pinjb or pinjc or pinjd
|
||||
print_error("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
|
||||
print_error("[#{t}]")
|
||||
print_good("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
|
||||
print_good("[#{t}]")
|
||||
|
||||
report_web_vuln(
|
||||
:host => ip,
|
||||
|
|
Loading…
Reference in New Issue