diff --git a/lib/msf/core/exploit/remote/ms_lsad.rb b/lib/msf/core/exploit/remote/ms_lsad.rb index e481c9b9ffb43..cdd16e3262360 100644 --- a/lib/msf/core/exploit/remote/ms_lsad.rb +++ b/lib/msf/core/exploit/remote/ms_lsad.rb @@ -10,10 +10,10 @@ module Exploit::Remote::MsLsad include Msf::Exploit::Remote::SMB::Client::Ipc - class MsLsarpcError < StandardError; end - class MsLsarpcConnectionError < MsLsarpcError; end - class MsLsarpcAuthenticationError < MsLsarpcError; end - class MsLsarpcUnexpectedReplyError < MsLsarpcError; end + class MsLsadError < StandardError; end + class MsLsadConnectionError < MsLsadError; end + class MsLsadAuthenticationError < MsLsadError; end + class MsLsadUnexpectedReplyError < MsLsadError; end LSA_UUID = '12345778-1234-abcd-ef00-0123456789ab'.freeze LSA_VERS = '0.0'.freeze @@ -87,10 +87,10 @@ def disconnect_lsarpc def connect_lsarpc(tree) begin - vprint_status('Connecting to Local Security Authority Remote Protocol') + vprint_status('Connecting to Local Security Authority (LSA) Remote Protocol') self.lsarpc_pipe = tree.open_file(filename: 'lsarpc', write: true, read: true) - raise MsLsarpcConnectionError.new('Could not open lsarpc pipe on remote SMB server.') unless lsarpc_pipe + raise MsLsadConnectionError.new('Could not open lsarpc pipe on remote SMB server.') unless lsarpc_pipe vprint_status('Binding to \\lsarpc...') self.lsarpc_pipe.bind(endpoint: LSARPC_ENDPOINT) @@ -99,7 +99,7 @@ def connect_lsarpc(tree) self.lsarpc_pipe rescue RubySMB::Dcerpc::Error::FaultError => e elog(e.message, error: e) - raise MsLsarpcUnexpectedReplyError, "Connection failed (DCERPC fault: #{e.status_name})" + raise MsLsadUnexpectedReplyError, "Connection failed (DCERPC fault: #{e.status_name})" end end