File tree Expand file tree Collapse file tree 1 file changed +4
-4
lines changed
modules/auxiliary/scanner/dlsw Expand file tree Collapse file tree 1 file changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -45,13 +45,13 @@ def initialize
45
45
46
46
# Called when using check
47
47
def check_host ( ip )
48
- print_status "Checking #{ ip } :#{ rport } for DLSw exposure"
48
+ print_status "#{ ip } :#{ rport } Checking for DLSw exposure"
49
49
connect
50
50
response = sock . recv ( 1024 )
51
51
disconnect
52
52
53
53
if ( response . length > 0 ) && ( response =~ /IOS Software|cisco.com/ )
54
- print_status ( "The target Cisco router appears vulnerable, we detected parts of a Cisco IOS banner string emitted from #{ ip } : #{ rport } " )
54
+ print_status ( "#{ ip } : #{ rport } The target Cisco router appears vulnerable, parts of a Cisco IOS banner were emitted" )
55
55
report_vuln ( {
56
56
:host => rhost ,
57
57
:port => rport ,
@@ -69,7 +69,7 @@ def check_host(ip)
69
69
def run_host ( ip )
70
70
return unless check_host ( ip ) == Exploit ::CheckCode ::Vulnerable
71
71
72
- print_status ( "Going to run until we retrieve #{ datastore [ 'LEAK_AMOUNT' ] } bytes from #{ ip } : #{ rport } " )
72
+ print_status ( "#{ ip } : #{ rport } Going to run until we retrieve #{ datastore [ 'LEAK_AMOUNT' ] } bytes" )
73
73
74
74
dlsw_data = ""
75
75
until dlsw_data . length > datastore [ 'LEAK_AMOUNT' ]
@@ -92,7 +92,7 @@ def loot_and_report(dlsw_data)
92
92
'DLSw_leaked_data' ,
93
93
'DLSw packet memory leak'
94
94
)
95
- print_status ( "DLSw leaked data from #{ ip } :#{ rport } stored in #{ path } " )
95
+ print_status ( "#{ ip } :#{ rport } DLSw leaked data stored in #{ path } " )
96
96
end
97
97
end
98
98
You can’t perform that action at this time.
0 commit comments