@@ -105,13 +105,13 @@ def bruteforce(ip)
105
105
scanner ( ip ) . scan! do |result |
106
106
case result . status
107
107
when Metasploit ::Model ::Login ::Status ::SUCCESSFUL
108
- print_brute :level => :good , :ip => ip , :msg => "Success: '#{ result . credential } '"
108
+ print_brute ( :level => :good , :ip => ip , :msg => "Success: '#{ result . credential } '" )
109
109
report_good_cred ( ip , rport , result )
110
110
when Metasploit ::Model ::Login ::Status ::UNABLE_TO_CONNECT
111
- vprint_brute :level => :verror , :ip => ip , :msg => result . proof
111
+ vprint_brute ( :level => :verror , :ip => ip , :msg => result . proof )
112
112
report_bad_cred ( ip , rport , result )
113
113
when Metasploit ::Model ::Login ::Status ::INCORRECT
114
- vprint_brute :level => :verror , :ip => ip , :msg => "Failed: '#{ result . credential } '"
114
+ vprint_brute ( :level => :verror , :ip => ip , :msg => "Failed: '#{ result . credential } '" )
115
115
report_bad_cred ( ip , rport , result )
116
116
end
117
117
end
@@ -121,7 +121,7 @@ def bruteforce(ip)
121
121
# Start here
122
122
def run_host ( ip )
123
123
unless scanner ( ip ) . check_setup
124
- print_brute :level => :error , :ip => ip , :msg => 'Target is not Symantec Web Gateway'
124
+ print_brute ( :level => :error , :ip => ip , :msg => 'Target is not Symantec Web Gateway' )
125
125
return
126
126
end
127
127
0 commit comments