Even more print_status -> print_good

This commit is contained in:
g0tmi1k 2017-07-19 11:46:39 +01:00
parent df9b642746
commit 0f453c602e
6 changed files with 11 additions and 10 deletions

View File

@ -115,7 +115,7 @@ class MetasploitModule < Msf::Exploit::Remote
)
return result[:auth]
else
print_status("Login failed, fingerprint is #{result[:preauth] || result[:unknown]}")
print_error("Login failed, fingerprint is #{result[:preauth] || result[:unknown]}")
return :noauth
end
rescue Rex::ConnectionError, Rex::Post::Meterpreter::RequestError

View File

@ -62,7 +62,7 @@ class MetasploitModule < Msf::Post
r = cmd_exec(cmd, count + ip_add)
end
if r =~ /(TTL|Alive)/i
print_status "\t#{ip_add} host found"
print_good "\t#{ip_add} host found"
ip_found << ip_add
else
vprint_status("\t#{ip_add} host not found")

View File

@ -165,7 +165,7 @@ class MetasploitModule < Msf::Post
# reports the hash info to metasploit backend
def report_hash(type, hash, user)
return unless hash.present?
print_status("#{type}:#{user}:#{hash}")
print_good("#{type}:#{user}:#{hash}")
case type
when "NT"
private_data = "#{Metasploit::Credential::NTLMHash::BLANK_LM_HASH}:#{hash}"

View File

@ -62,7 +62,7 @@ class MetasploitModule < Msf::Post
if h["return"] == client.railgun.const("NO_ERROR")
mac_text = h["pMacAddr"].unpack('C*').map { |e| "%02x" % e }.join(':')
company = OUI_LIST::lookup_oui_company_name(mac_text )
print_status("\tIP: #{ip_text} MAC #{mac_text} (#{company})")
print_good("\tIP: #{ip_text} MAC #{mac_text} (#{company})")
report_host(:host => ip_text,:mac => mac_text)
next if company.nil?
report_note(:host => ip_text, :type => "mac_oui", :data => company)

View File

@ -70,7 +70,7 @@ class MetasploitModule < Msf::Post
:data => { :hypervisor => "MS Hyper-V" },
:update => :unique_data
)
print_status("This is a Hyper-V Virtual Machine")
print_good("This is a Hyper-V Virtual Machine")
return "MS Hyper-V"
end
end
@ -120,7 +120,7 @@ class MetasploitModule < Msf::Post
:data => { :hypervisor => "VMware" },
:update => :unique_data
)
print_status("This is a VMware Virtual Machine")
print_good("This is a VMware Virtual Machine")
return "VMWare"
end
end
@ -156,7 +156,7 @@ class MetasploitModule < Msf::Post
:data => { :hypervisor => "VirtualPC" },
:update => :unique_data
)
print_status("This is a VirtualPC Virtual Machine")
print_good("This is a VirtualPC Virtual Machine")
return "VirtualPC"
end
end
@ -223,7 +223,7 @@ class MetasploitModule < Msf::Post
:data => { :hypervisor => "VirtualBox" },
:update => :unique_data
)
print_status("This is a Sun VirtualBox Virtual Machine")
print_good("This is a Sun VirtualBox Virtual Machine")
return "VirtualBox"
end
end
@ -280,7 +280,7 @@ class MetasploitModule < Msf::Post
:data => { :hypervisor => "Xen" },
:update => :unique_data
)
print_status("This is a Xen Virtual Machine")
print_good("This is a Xen Virtual Machine")
return "Xen"
end
end
@ -309,6 +309,7 @@ class MetasploitModule < Msf::Post
:data => { :hypervisor => "Qemu/KVM" },
:update => :unique_data
)
print_good("This is a Qemu/KVM Virtual Machine")
return "Qemu/KVM"
end
end

View File

@ -100,7 +100,7 @@ class MetasploitModule < Msf::Post
print_error("No systems found of that type")
return
end
print_status("Found #{result['totalentries']} systems.")
print_good("Found #{result['totalentries']} systems.")
endofline = 0
i = nameiterator