@@ -368,7 +368,7 @@ def __forgeMsfPayloadCmd(self, exitfunc, format, outFile, extra=None):
368368 def __runMsfCliSmbrelay (self ):
369369 self .__forgeMsfCliCmdForSmbrelay ()
370370
371- infoMsg = "running Metasploit Framework 3 command line "
371+ infoMsg = "running Metasploit Framework command line "
372372 infoMsg += "interface locally, please wait.."
373373 logger .info (infoMsg )
374374
@@ -378,22 +378,22 @@ def __runMsfCliSmbrelay(self):
378378 def __runMsfCli (self , exitfunc ):
379379 self .__forgeMsfCliCmd (exitfunc )
380380
381- infoMsg = "running Metasploit Framework 3 command line "
381+ infoMsg = "running Metasploit Framework command line "
382382 infoMsg += "interface locally, please wait.."
383383 logger .info (infoMsg )
384384
385385 logger .debug ("executing local command: %s" % self .__cliCmd )
386386 self .__msfCliProc = execute (self .__cliCmd , shell = True , stdin = PIPE , stdout = PIPE , stderr = PIPE )
387387
388388 def __runMsfShellcodeRemote (self ):
389- infoMsg = "running Metasploit Framework 3 shellcode "
389+ infoMsg = "running Metasploit Framework shellcode "
390390 infoMsg += "remotely via UDF 'sys_bineval', please wait.."
391391 logger .info (infoMsg )
392392
393393 self .udfExecCmd ("'%s'" % self .shellcodeString , silent = True , udfName = "sys_bineval" )
394394
395395 def __runMsfShellcodeRemoteViaSexec (self ):
396- infoMsg = "running Metasploit Framework 3 shellcode remotely "
396+ infoMsg = "running Metasploit Framework shellcode remotely "
397397 infoMsg += "via shellcodeexec, please wait.."
398398 logger .info (infoMsg )
399399
@@ -495,7 +495,7 @@ def __controlMsfCmd(self, proc, func):
495495 return returncode
496496
497497 def createMsfShellcode (self , exitfunc , format , extra , encode ):
498- infoMsg = "creating Metasploit Framework 3 multi-stage shellcode "
498+ infoMsg = "creating Metasploit Framework multi-stage shellcode "
499499 logger .info (infoMsg )
500500
501501 self .__randStr = randomStr (lowercase = True )
@@ -574,7 +574,7 @@ def pwn(self, goUdf=False):
574574 if self .connectionStr .startswith ("bind" ):
575575 func ()
576576
577- debugMsg = "Metasploit Framework 3 command line interface exited "
577+ debugMsg = "Metasploit Framework command line interface exited "
578578 debugMsg += "with return code %s" % self .__controlMsfCmd (self .__msfCliProc , func )
579579 logger .debug (debugMsg )
580580
@@ -593,7 +593,7 @@ def smb(self):
593593 else :
594594 self .uncPath = "\\ \\ %s\\ %s" % (self .lhostStr , self .__randFile )
595595
596- debugMsg = "Metasploit Framework 3 console exited with return "
596+ debugMsg = "Metasploit Framework console exited with return "
597597 debugMsg += "code %s" % self .__controlMsfCmd (self .__msfCliProc , self .uncPathRequest )
598598 logger .debug (debugMsg )
599599
@@ -603,6 +603,6 @@ def bof(self):
603603 if self .connectionStr .startswith ("bind" ):
604604 self .spHeapOverflow ()
605605
606- debugMsg = "Metasploit Framework 3 command line interface exited "
606+ debugMsg = "Metasploit Framework command line interface exited "
607607 debugMsg += "with return code %s" % self .__controlMsfCmd (self .__msfCliProc , self .spHeapOverflow )
608608 logger .debug (debugMsg )
0 commit comments