When a blind SQL injection, it's a good thing (for the attacker), so we should use print_good

unstable
sinn3r 2012-05-08 01:26:39 -05:00
parent ce16ab662c
commit fa9d23d839
1 changed files with 4 additions and 4 deletions

View File

@ -228,8 +228,8 @@ class Metasploit3 < Msf::Auxiliary
pinjd = detection_d(normalres,trueres,falseres,tarr)
if pinja or pinjb or pinjc or pinjd
print_error("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
print_error("[#{t}]")
print_good("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
print_good("[#{t}]")
report_web_vuln(
:host => ip,
@ -319,8 +319,8 @@ class Metasploit3 < Msf::Auxiliary
pinjd = detection_d(normalres,trueres,falseres,tarr)
if pinja or pinjb or pinjc or pinjd
print_error("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
print_error("[#{t}]")
print_good("Possible #{tarr[0]} Blind SQL Injection Found #{datastore['PATH']} #{key}")
print_good("[#{t}]")
report_web_vuln(
:host => ip,