diff --git a/mitmf.py b/mitmf.py index a55aadb..787a84e 100755 --- a/mitmf.py +++ b/mitmf.py @@ -26,7 +26,7 @@ if __name__ == "__main__": #add sslstrip options sgroup = parser.add_argument_group("sslstrip","Options for sslstrip library") sgroup.add_argument("-w","--write",type=argparse.FileType('w'),metavar="filename", default=sys.stdout,help="Specify file to log to (stdout by default).") - sgroup.add_argument("--log-level",type=str,choices=['debug','info','warning','error'],default="info",help="Specify file to log to (stdout by default).") + sgroup.add_argument("--log-level",type=str,choices=['debug','info'],default="info",help="Specify file to log to (stdout by default).") slogopts = sgroup.add_mutually_exclusive_group() slogopts.add_argument("-p","--post",action="store_true",help="Log only SSL POSTs. (default)") slogopts.add_argument("-s","--ssl",action="store_true",help="Log all SSL traffic to and from server.") diff --git a/plugins/JavaPwn.py b/plugins/JavaPwn.py index 8bfed72..767ae34 100644 --- a/plugins/JavaPwn.py +++ b/plugins/JavaPwn.py @@ -119,7 +119,6 @@ class JavaPwn(BrowserProfiler, Plugin): if len(jobs) > 0: for k,v in jobs.items(): info = msf.call('job.info', [k]) - print info if exploit in info['name']: logging.info('%s >> \t %s exploit already started' % (vic_ip, exploit)) url = info['uripath'] #get the url assigned to the exploit