Skip to content

Commit 753ca1d

Browse files
committed
reviews for jasmin ransomware panel
1 parent 8240b86 commit 753ca1d

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

modules/auxiliary/gather/jasmin_ransomware_dir_traversal.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
##
55

66
class MetasploitModule < Msf::Auxiliary
7+
prepend Msf::Exploit::Remote::AutoCheck
78
include Msf::Auxiliary::Report
89
include Msf::Exploit::Remote::HttpClient
910

@@ -65,7 +66,7 @@ def run
6566
)
6667
fail_with(Failure::Unknown, 'No response from server') if res.nil?
6768
fail_with(Failure::NotFound, 'Check FILE or DEPTH, file not found on server') if res.body.empty?
68-
fail_with(Failure::UnexpectedReply, "Server returned an unexpected HTTP code: #{res.code}") unless res.code == 200
69+
fail_with(Failure::UnexpectedReply, "Server returned an unexpected HTTP code: #{res.code}") unless res.code == 302
6970

7071
print_good(res.body)
7172
# store loot

modules/auxiliary/gather/jasmin_ransomware_sqli.rb

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
##
55

66
class MetasploitModule < Msf::Auxiliary
7+
prepend Msf::Exploit::Remote::AutoCheck
78
include Msf::Auxiliary::Report
89
include Msf::Exploit::Remote::HttpClient
910
include Msf::Exploit::SQLi
@@ -74,10 +75,8 @@ def run
7475
fail_with(Failure::Unreachable, 'Connection failed') unless res
7576
end
7677

77-
unless @sqli.test_vulnerable
78-
print_bad("#{peer} - Testing of SQLi failed. If this is time based, try increasing SqliDelay.")
79-
return
80-
end
78+
fail_with(Failure::NotVulnerable, "#{peer} - Testing of SQLi failed. If this is time based, try increasing SqliDelay.") unless @sqli.test_vulnerable
79+
8180
columns = ['admin', 'creds']
8281
vprint_status('Dumping login table')
8382
data = @sqli.dump_table_fields('master', columns, '')

0 commit comments

Comments
 (0)