@@ -86,7 +86,7 @@ def execute_script(script_name, *args)
86
86
copy_of_orig_exploit_datastore = original_exploit_datastore . clone
87
87
# convert datastore opts to a hash to normalize casing issues
88
88
local_exploit_opts = { }
89
- copy_of_orig_exploit_datastore . each do |k , v |
89
+ copy_of_orig_exploit_datastore . each do |k , v |
90
90
local_exploit_opts [ k . downcase ] = v
91
91
end
92
92
# we don't want to inherit a couple things, like AutoRunScript's
@@ -98,15 +98,7 @@ def execute_script(script_name, *args)
98
98
# merge in any opts that were passed in, defaulting all other settings
99
99
# to the values from the datastore (of the exploit) that spawned the
100
100
# session
101
- print_debug "local_exploit_opts"
102
- print_error local_exploit_opts . inspect
103
- print_error "lport:#{ local_exploit_opts [ 'lport' ] } ,LPORT:#{ local_exploit_opts [ 'LPORT' ] } "
104
- print_error "payload:#{ local_exploit_opts [ 'payload' ] } ,PAYLOAD:#{ local_exploit_opts [ 'PAYLOAD' ] } "
105
101
local_exploit_opts = local_exploit_opts . merge ( opts )
106
- print_error "after merge"
107
- print_error local_exploit_opts . inspect
108
- print_error "lport:#{ local_exploit_opts [ 'lport' ] } ,LPORT:#{ local_exploit_opts [ 'LPORT' ] } "
109
- print_error "payload:#{ local_exploit_opts [ 'payload' ] } ,PAYLOAD:#{ local_exploit_opts [ 'PAYLOAD' ] } "
110
102
111
103
# try to run this local exploit, which is likely to be exception prone
112
104
begin
@@ -139,7 +131,7 @@ def execute_script(script_name, *args)
139
131
140
132
# No path found? Weak.
141
133
if full_path . nil?
142
- print_error ( "The specified script could not be found: #{ script_name } " )
134
+ print_error ( "The specified module could not be found: #{ script_name } " )
143
135
return true
144
136
end
145
137
framework . events . on_session_script_run ( self , full_path )
0 commit comments