Skip to content

Commit a05e05f

Browse files
author
tate
committed
prefixing all print statements with ip:rport
1 parent 6b8b49f commit a05e05f

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/auxiliary/scanner/dlsw/dlsw_leak_capture.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,13 +45,13 @@ def initialize
4545

4646
# Called when using check
4747
def check_host(ip)
48-
print_status "Checking #{ip}:#{rport} for DLSw exposure"
48+
print_status "#{ip}:#{rport} Checking for DLSw exposure"
4949
connect
5050
response = sock.recv(1024)
5151
disconnect
5252

5353
if (response.length > 0) && (response =~ /IOS Software|cisco.com/)
54-
print_status("The target Cisco router appears vulnerable, we detected parts of a Cisco IOS banner string emitted from #{ip}:#{rport}")
54+
print_status("#{ip}:#{rport} The target Cisco router appears vulnerable, parts of a Cisco IOS banner were emitted")
5555
report_vuln({
5656
:host => rhost,
5757
:port => rport,
@@ -69,7 +69,7 @@ def check_host(ip)
6969
def run_host(ip)
7070
return unless check_host(ip) == Exploit::CheckCode::Vulnerable
7171

72-
print_status("Going to run until we retrieve #{datastore['LEAK_AMOUNT']} bytes from #{ip}:#{rport}")
72+
print_status("#{ip}:#{rport} Going to run until we retrieve #{datastore['LEAK_AMOUNT']} bytes")
7373

7474
dlsw_data = ""
7575
until dlsw_data.length > datastore['LEAK_AMOUNT']
@@ -92,7 +92,7 @@ def loot_and_report(dlsw_data)
9292
'DLSw_leaked_data',
9393
'DLSw packet memory leak'
9494
)
95-
print_status("DLSw leaked data from #{ip}:#{rport} stored in #{path}")
95+
print_status("#{ip}:#{rport} DLSw leaked data stored in #{path}")
9696
end
9797
end
9898

0 commit comments

Comments
 (0)