Even more print_status -> print_good
This commit is contained in:
parent
df9b642746
commit
0f453c602e
|
@ -115,7 +115,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
)
|
||||
return result[:auth]
|
||||
else
|
||||
print_status("Login failed, fingerprint is #{result[:preauth] || result[:unknown]}")
|
||||
print_error("Login failed, fingerprint is #{result[:preauth] || result[:unknown]}")
|
||||
return :noauth
|
||||
end
|
||||
rescue Rex::ConnectionError, Rex::Post::Meterpreter::RequestError
|
||||
|
|
|
@ -62,7 +62,7 @@ class MetasploitModule < Msf::Post
|
|||
r = cmd_exec(cmd, count + ip_add)
|
||||
end
|
||||
if r =~ /(TTL|Alive)/i
|
||||
print_status "\t#{ip_add} host found"
|
||||
print_good "\t#{ip_add} host found"
|
||||
ip_found << ip_add
|
||||
else
|
||||
vprint_status("\t#{ip_add} host not found")
|
||||
|
|
|
@ -165,7 +165,7 @@ class MetasploitModule < Msf::Post
|
|||
# reports the hash info to metasploit backend
|
||||
def report_hash(type, hash, user)
|
||||
return unless hash.present?
|
||||
print_status("#{type}:#{user}:#{hash}")
|
||||
print_good("#{type}:#{user}:#{hash}")
|
||||
case type
|
||||
when "NT"
|
||||
private_data = "#{Metasploit::Credential::NTLMHash::BLANK_LM_HASH}:#{hash}"
|
||||
|
|
|
@ -62,7 +62,7 @@ class MetasploitModule < Msf::Post
|
|||
if h["return"] == client.railgun.const("NO_ERROR")
|
||||
mac_text = h["pMacAddr"].unpack('C*').map { |e| "%02x" % e }.join(':')
|
||||
company = OUI_LIST::lookup_oui_company_name(mac_text )
|
||||
print_status("\tIP: #{ip_text} MAC #{mac_text} (#{company})")
|
||||
print_good("\tIP: #{ip_text} MAC #{mac_text} (#{company})")
|
||||
report_host(:host => ip_text,:mac => mac_text)
|
||||
next if company.nil?
|
||||
report_note(:host => ip_text, :type => "mac_oui", :data => company)
|
||||
|
|
|
@ -70,7 +70,7 @@ class MetasploitModule < Msf::Post
|
|||
:data => { :hypervisor => "MS Hyper-V" },
|
||||
:update => :unique_data
|
||||
)
|
||||
print_status("This is a Hyper-V Virtual Machine")
|
||||
print_good("This is a Hyper-V Virtual Machine")
|
||||
return "MS Hyper-V"
|
||||
end
|
||||
end
|
||||
|
@ -120,7 +120,7 @@ class MetasploitModule < Msf::Post
|
|||
:data => { :hypervisor => "VMware" },
|
||||
:update => :unique_data
|
||||
)
|
||||
print_status("This is a VMware Virtual Machine")
|
||||
print_good("This is a VMware Virtual Machine")
|
||||
return "VMWare"
|
||||
end
|
||||
end
|
||||
|
@ -156,7 +156,7 @@ class MetasploitModule < Msf::Post
|
|||
:data => { :hypervisor => "VirtualPC" },
|
||||
:update => :unique_data
|
||||
)
|
||||
print_status("This is a VirtualPC Virtual Machine")
|
||||
print_good("This is a VirtualPC Virtual Machine")
|
||||
return "VirtualPC"
|
||||
end
|
||||
end
|
||||
|
@ -223,7 +223,7 @@ class MetasploitModule < Msf::Post
|
|||
:data => { :hypervisor => "VirtualBox" },
|
||||
:update => :unique_data
|
||||
)
|
||||
print_status("This is a Sun VirtualBox Virtual Machine")
|
||||
print_good("This is a Sun VirtualBox Virtual Machine")
|
||||
return "VirtualBox"
|
||||
end
|
||||
end
|
||||
|
@ -280,7 +280,7 @@ class MetasploitModule < Msf::Post
|
|||
:data => { :hypervisor => "Xen" },
|
||||
:update => :unique_data
|
||||
)
|
||||
print_status("This is a Xen Virtual Machine")
|
||||
print_good("This is a Xen Virtual Machine")
|
||||
return "Xen"
|
||||
end
|
||||
end
|
||||
|
@ -309,6 +309,7 @@ class MetasploitModule < Msf::Post
|
|||
:data => { :hypervisor => "Qemu/KVM" },
|
||||
:update => :unique_data
|
||||
)
|
||||
print_good("This is a Qemu/KVM Virtual Machine")
|
||||
return "Qemu/KVM"
|
||||
end
|
||||
end
|
||||
|
|
|
@ -100,7 +100,7 @@ class MetasploitModule < Msf::Post
|
|||
print_error("No systems found of that type")
|
||||
return
|
||||
end
|
||||
print_status("Found #{result['totalentries']} systems.")
|
||||
print_good("Found #{result['totalentries']} systems.")
|
||||
|
||||
endofline = 0
|
||||
i = nameiterator
|
||||
|
|
Loading…
Reference in New Issue