mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Add vim_soap to the mixins list.
Fixes an issue where a different module load order would result in one of the vmware modules failing to load be cause vim_soap hadn't been required yet. Thanks d0rm0us3 for having a weird system and spotting stuff like this.
This commit is contained in:
parent
cda9166180
commit
89e0842b1e
@ -53,6 +53,7 @@ require 'msf/core/exploit/pop2'
|
|||||||
require 'msf/core/exploit/tns'
|
require 'msf/core/exploit/tns'
|
||||||
require 'msf/core/exploit/db2'
|
require 'msf/core/exploit/db2'
|
||||||
require 'msf/core/exploit/postgres'
|
require 'msf/core/exploit/postgres'
|
||||||
|
require 'msf/core/exploit/vim_soap'
|
||||||
require 'msf/core/exploit/wdbrpc'
|
require 'msf/core/exploit/wdbrpc'
|
||||||
require 'msf/core/exploit/wdbrpc_client'
|
require 'msf/core/exploit/wdbrpc_client'
|
||||||
|
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
@ -42,10 +41,10 @@ class Metasploit3 < Msf::Auxiliary
|
|||||||
def run
|
def run
|
||||||
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
||||||
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
||||||
case vm_ref
|
case vm_ref
|
||||||
when String
|
when String
|
||||||
return_state = vim_powerOFF_vm(vm_ref)
|
return_state = vim_powerOFF_vm(vm_ref)
|
||||||
case return_state
|
case return_state
|
||||||
when 'success'
|
when 'success'
|
||||||
print_good "VM Powered Off Successfully"
|
print_good "VM Powered Off Successfully"
|
||||||
when 'alreadyOFF'
|
when 'alreadyOFF'
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
@ -43,10 +42,10 @@ class Metasploit3 < Msf::Auxiliary
|
|||||||
|
|
||||||
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
||||||
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
||||||
case vm_ref
|
case vm_ref
|
||||||
when String
|
when String
|
||||||
return_state = vim_powerON_vm(vm_ref)
|
return_state = vim_powerON_vm(vm_ref)
|
||||||
case return_state
|
case return_state
|
||||||
when 'success'
|
when 'success'
|
||||||
print_good "VM Powered On Successfully"
|
print_good "VM Powered On Successfully"
|
||||||
when 'alreadyON'
|
when 'alreadyON'
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
@ -24,8 +23,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||||||
super(
|
super(
|
||||||
'Name' => 'VMWare Tag Virtual Machine',
|
'Name' => 'VMWare Tag Virtual Machine',
|
||||||
'Description' => %Q{
|
'Description' => %Q{
|
||||||
This module will log into the Web API of VMWare and
|
This module will log into the Web API of VMWare and
|
||||||
'tag' a specified Virtual Machine. It does this by
|
'tag' a specified Virtual Machine. It does this by
|
||||||
logging a user event with user supplied text},
|
logging a user event with user supplied text},
|
||||||
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
'Author' => ['TheLightCosine <thelightcosine[at]metasploit.com>'],
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
@ -45,7 +44,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||||||
|
|
||||||
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
if vim_do_login(datastore['USERNAME'], datastore['PASSWORD']) == :success
|
||||||
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
vm_ref = vim_find_vm_by_name(datastore['VM'])
|
||||||
case vm_ref
|
case vm_ref
|
||||||
when String
|
when String
|
||||||
result = vim_log_event_vm(vm_ref, datastore['MSG'])
|
result = vim_log_event_vm(vm_ref, datastore['MSG'])
|
||||||
case result
|
case result
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
@ -11,7 +11,6 @@
|
|||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
require 'msf/core/exploit/vim_soap'
|
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
Loading…
Reference in New Issue
Block a user