1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Uses peer instead of ip:port across all the module

This commit is contained in:
erwanlr 2015-05-28 09:32:05 +01:00
parent 447c4ee7df
commit 6d01d7f986

View File

@ -60,7 +60,7 @@ class Metasploit3 < Msf::Auxiliary
if check_host(ip) == Exploit::CheckCode::Vulnerable
dos_host(ip)
else
print_status("#{ip}:#{rport} - Probably not vulnerable, will not dos it.")
print_status("#{peer} - Probably not vulnerable, will not dos it.")
end
end
@ -76,17 +76,17 @@ class Metasploit3 < Msf::Auxiliary
res = send_request_raw('uri' => uri)
unless res
vprint_error("#{ip}:#{rport} - Connection timed out")
vprint_error("#{peer} - Connection timed out")
return file_size
end
if res.code == 404
vprint_error("#{ip}:#{rport} - You got a 404. URI must be a valid resource.")
vprint_error("#{peer} - You got a 404. URI must be a valid resource.")
return file_size
end
file_size = res.body.length
vprint_status("#{ip}:#{rport} - File length: #{file_size} bytes")
vprint_status("#{peer} - File length: #{file_size} bytes")
return file_size
}.call
@ -112,7 +112,7 @@ class Metasploit3 < Msf::Auxiliary
rescue ::Errno::EPIPE, ::Timeout::Error
# Same exceptions the HttpClient mixin catches
end
print_status("#{ip}:#{rport} - DOS request sent")
print_status("#{peer} - DOS request sent")
end
def potential_static_files_uris