diff --git a/modules/post/multi/manage/play_youtube.rb b/modules/post/multi/manage/play_youtube.rb index a80919af62..0c5d85ce3d 100644 --- a/modules/post/multi/manage/play_youtube.rb +++ b/modules/post/multi/manage/play_youtube.rb @@ -31,11 +31,6 @@ class Metasploit3 < Msf::Post ], self.class) end - def peer - "#{session.session_host}:#{session.session_port}" - end - - # # The OSX version uses an apple script to do this # diff --git a/modules/post/osx/gather/safari_lastsession.rb b/modules/post/osx/gather/safari_lastsession.rb index f3548cddf8..1763927d2d 100644 --- a/modules/post/osx/gather/safari_lastsession.rb +++ b/modules/post/osx/gather/safari_lastsession.rb @@ -58,11 +58,6 @@ class Metasploit3 < Msf::Post version end - def peer - "#{session.session_host}:#{session.session_port}" - end - - # # Converts LastSession.plist to xml, and then read it # @param filename [String] The path to LastSession.plist diff --git a/modules/post/windows/gather/credentials/smartermail.rb b/modules/post/windows/gather/credentials/smartermail.rb index 5c934c5584..cb0fce4d6e 100644 --- a/modules/post/windows/gather/credentials/smartermail.rb +++ b/modules/post/windows/gather/credentials/smartermail.rb @@ -38,22 +38,6 @@ class Metasploit3 < Msf::Post )) end - def r_host - if session.type =~ /meterpreter/ - session.sock.peerhost - else - session.session_host - end - end - - def peer - if session.type =~ /meterpreter/ - "#{r_host} (#{sysinfo['Computer']})" - else - r_host - end - end - # # Decrypt DES encrypted password string # @@ -215,7 +199,7 @@ class Metasploit3 < Msf::Post print_good "#{peer} - Found Username: '#{user}' Password: '#{pass}'" report_cred( - ip: r_host, + ip: rhost, port: port, service_name: 'http', user: user,