1
0
mirror of https://github.com/byt3bl33d3r/MITMf.git synced 2025-03-12 04:35:49 -07:00

removed a print statement

This commit is contained in:
byt3bl33d3r 2014-07-15 22:51:37 +02:00
parent 24b0706dd5
commit 24300e8d5b
2 changed files with 1 additions and 2 deletions

@ -26,7 +26,7 @@ if __name__ == "__main__":
#add sslstrip options
sgroup = parser.add_argument_group("sslstrip","Options for sslstrip library")
sgroup.add_argument("-w","--write",type=argparse.FileType('w'),metavar="filename", default=sys.stdout,help="Specify file to log to (stdout by default).")
sgroup.add_argument("--log-level",type=str,choices=['debug','info','warning','error'],default="info",help="Specify file to log to (stdout by default).")
sgroup.add_argument("--log-level",type=str,choices=['debug','info'],default="info",help="Specify file to log to (stdout by default).")
slogopts = sgroup.add_mutually_exclusive_group()
slogopts.add_argument("-p","--post",action="store_true",help="Log only SSL POSTs. (default)")
slogopts.add_argument("-s","--ssl",action="store_true",help="Log all SSL traffic to and from server.")

@ -119,7 +119,6 @@ class JavaPwn(BrowserProfiler, Plugin):
if len(jobs) > 0:
for k,v in jobs.items():
info = msf.call('job.info', [k])
print info
if exploit in info['name']:
logging.info('%s >> \t %s exploit already started' % (vic_ip, exploit))
url = info['uripath'] #get the url assigned to the exploit