From eb847a3dfbf64a85ccfa2fd3bc198147fea0e14d Mon Sep 17 00:00:00 2001 From: HD Moore Date: Thu, 8 Mar 2012 13:46:14 -0600 Subject: [PATCH] Add a nicer prefix to the target selection message --- modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb b/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb index ed05b425e7..2ecd352420 100644 --- a/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb +++ b/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb @@ -87,7 +87,7 @@ class Metasploit3 < Msf::Exploit::Remote # Both ROP chains generated by mona.py - See corelan.be case t['Rop'] when :msvcrt - print_status("Using msvcrt ROP") + print_status("#{cli.peerhost}:#{cli.peerport} Using msvcrt ROP") rop = [ 0x77c4e392, # POP EAX # RETN @@ -111,7 +111,7 @@ class Metasploit3 < Msf::Exploit::Remote ].pack("V*") when :jre - print_status("Using JRE ROP") + print_status("#{cli.peerhost}:#{cli.peerport} Using JRE ROP") rop = [ 0x7c37653d, # POP EAX # POP EDI # POP ESI # POP EBX # POP EBP # RETN