From ee5d91faabc0b75c349504fdfdbe2c092d051377 Mon Sep 17 00:00:00 2001 From: Jon Hart Date: Mon, 16 Nov 2015 10:41:48 -0800 Subject: [PATCH] Better logging when exploit gets 401 --- modules/exploits/linux/http/f5_icall_cmd.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/linux/http/f5_icall_cmd.rb b/modules/exploits/linux/http/f5_icall_cmd.rb index dda149f99c..c3fc67340a 100644 --- a/modules/exploits/linux/http/f5_icall_cmd.rb +++ b/modules/exploits/linux/http/f5_icall_cmd.rb @@ -217,7 +217,7 @@ class Metasploit3 < Msf::Exploit::Remote if res && res.code == 500 && res.body =~ /path is empty/ return Exploit::CheckCode::Appears elsif res && res.code == 401 - print_error('401 Unauthorized') + print_warning("HTTP/#{res.proto} #{res.status} #{res.message} -- incorrect USERNAME or PASSWORD?") return Exploit::CheckCode::Unknown else return Exploit::CheckCode::Safe