diff --git a/formloginbrute.rb b/formloginbrute.rb index 5f1c028..de3d9bd 100755 --- a/formloginbrute.rb +++ b/formloginbrute.rb @@ -60,8 +60,8 @@ def brute_by_force(url) if (login_request.body.scan(/"#{login_form.name}"/i).empty? and login_request.body.scan(/"#{username_field.name}"/i).empty? and login_request.body.scan(/"#{username_field.name}"/i).empty?) - puts "Yatta, found default login credentials for #{url} - #{username} / #{password}\n".green - $logfile.info("Yatta, found default login credentials for #{url} - #{username} / #{password}") + puts "[+] Yatta, found default login credentials for #{url} - #{username} / #{password}\n".green + $logfile.info("[+] Yatta, found default login credentials for #{url} - #{username} / #{password}") return username, password end rescue Mechanize::ResponseCodeError => exception diff --git a/yasuo.rb b/yasuo.rb index a9902e9..335a8be 100755 --- a/yasuo.rb +++ b/yasuo.rb @@ -371,8 +371,8 @@ def find_vulnerable_applications(target_urls) target_urls.delete_at(myindex) if not resp.body.scan(/