mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Add vim_soap to the mixins list.
Fixes an issue where a different module load order would result in one of the vmware modules failing to load be cause vim_soap hadn't been required yet. Thanks d0rm0us3 for having a weird system and spotting stuff like this.
This commit is contained in:
parent
cda9166180
commit
89e0842b1e
@ -53,6 +53,7 @@ require 'msf/core/exploit/pop2'
|
||||
require 'msf/core/exploit/tns'
|
||||
require 'msf/core/exploit/db2'
|
||||
require 'msf/core/exploit/postgres'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
require 'msf/core/exploit/wdbrpc'
|
||||
require 'msf/core/exploit/wdbrpc_client'
|
||||
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
@ -42,10 +41,10 @@ class Metasploit3 < Msf::Auxiliary
|
||||
def run
|
||||
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
||||
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
||||
case vm_ref
|
||||
case vm_ref
|
||||
when String
|
||||
return_state = vim_powerOFF_vm(vm_ref)
|
||||
case return_state
|
||||
case return_state
|
||||
when 'success'
|
||||
print_good "VM Powered Off Successfully"
|
||||
when 'alreadyOFF'
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
@ -43,10 +42,10 @@ class Metasploit3 < Msf::Auxiliary
|
||||
|
||||
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
||||
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
||||
case vm_ref
|
||||
case vm_ref
|
||||
when String
|
||||
return_state = vim_powerON_vm(vm_ref)
|
||||
case return_state
|
||||
case return_state
|
||||
when 'success'
|
||||
print_good "VM Powered On Successfully"
|
||||
when 'alreadyON'
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
@ -24,8 +23,8 @@ class Metasploit3 < Msf::Auxiliary
|
||||
super(
|
||||
'Name' => 'VMWare Tag Virtual Machine',
|
||||
'Description' => %Q{
|
||||
This module will log into the Web API of VMWare and
|
||||
'tag' a specified Virtual Machine. It does this by
|
||||
This module will log into the Web API of VMWare and
|
||||
'tag' a specified Virtual Machine. It does this by
|
||||
logging a user event with user supplied text},
|
||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||
'License' => MSF_LICENSE
|
||||
@ -45,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
|
||||
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
||||
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
||||
case vm_ref
|
||||
case vm_ref
|
||||
when String
|
||||
result = vim_log_event_vm(vm_ref, datastore['MSG'])
|
||||
case result
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
|
@ -11,7 +11,6 @@
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
require 'msf/core/exploit/vim_soap'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
|
Loading…
Reference in New Issue
Block a user