From 201cdfb1892204494c4ed90878b218593ba2c65f Mon Sep 17 00:00:00 2001 From: Dhiraj Mishra Date: Fri, 6 Apr 2018 22:54:21 +0530 Subject: [PATCH] Handling execption by MSFTIDY --- .../{browser_getprivateip.rb => browser_lanipleak.rb} | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) rename modules/auxiliary/gather/{browser_getprivateip.rb => browser_lanipleak.rb} (92%) diff --git a/modules/auxiliary/gather/browser_getprivateip.rb b/modules/auxiliary/gather/browser_lanipleak.rb similarity index 92% rename from modules/auxiliary/gather/browser_getprivateip.rb rename to modules/auxiliary/gather/browser_lanipleak.rb index f205146bc0..16ea32a530 100644 --- a/modules/auxiliary/gather/browser_getprivateip.rb +++ b/modules/auxiliary/gather/browser_lanipleak.rb @@ -13,7 +13,7 @@ class MetasploitModule < Msf::Auxiliary 'Name' => "Private IP Leakage to WebPage using WebRTC Function.", 'Description' => %q( This module uses WebRTC component to gather complete client information and browser can - disclose a private IP address in a STUN request. + disclose a private IP address in a STUN request ), 'License' => MSF_LICENSE, 'Author' => [ @@ -130,13 +130,13 @@ getIPs(function(ip){ def on_request_uri(cli, request) case request.method.downcase when 'get' - print_good("#{cli.peerhost}: Sending response (#{@html.size} bytes)") + print_status("#{cli.peerhost}: Sending response (#{@html.size} bytes)") send_response(cli, @html) when 'post' - print_good("#{cli.peerhost}: Received reply:") - puts request.to_s + print_status("#{cli.peerhost}: Received reply:") + print_line("#{puts request.to_s}") else - print_good("#{cli.peerhost}: Unhandled method: #{request.method}") + print_error("#{cli.peerhost}: Unhandled method: #{request.method}") end end end