Skip to content

Commit be0f070

Browse files
committed
update
1 parent 6ffaae9 commit be0f070

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

hackshell.sh

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1022,7 +1022,7 @@ _loot_openstack() {
10221022
echo -e "${CB}OpenStack user_data${CDY}${CF}"
10231023
echo "$str"
10241024
echo -en "${CN}"
1025-
echo -e "${CW}TIP: ${CDC}"'dl "http://169.254.169.254/openstack/latest/meta_data.json" | jq -r'"${CN}"
1025+
[ -z "$QUIET" ] && echo -e "${CW}TIP: ${CDC}"'dl "http://169.254.169.254/openstack/latest/meta_data.json" | jq -r'"${CN}"
10261026
}
10271027
10281028
# FIXME: Search through environment variables of all running processes.
@@ -1097,7 +1097,7 @@ _loot_yandex() {
10971097
echo -e "${CB}Yandex Cloud user-data (config)${CDY}${CF}"
10981098
echo "$str"
10991099
echo -en "${CN}"
1100-
echo -e "${CW}TIP: ${CDC}curl -SsfL 'http://169.254.169.254/computeMetadata/v1/instance/?alt=text&recursive=true' -H 'Metadata-Flavor:Google'${CN}"
1100+
[ -z "$QUIET" ] && echo -e "${CW}TIP: ${CDC}curl -SsfL 'http://169.254.169.254/computeMetadata/v1/instance/?alt=text&recursive=true' -H 'Metadata-Flavor:Google'${CN}"
11011101
}
11021102
11031103
# make GS-NETCAT command available if logged in via GSNC.
@@ -1517,7 +1517,7 @@ lootmore() {
15171517
}
15181518
15191519
unset HOMEDIRARR
1520-
[ -z "$ROOTFS" ] && echo -e "${CW}TIP:${CN} Type ${CDC}ws${CN} to find out more about this host."
1520+
[ -z "$ROOTFS" ] && [ -z "$QUIET" ] && echo -e "${CW}TIP:${CN} Type ${CDC}ws${CN} to find out more about this host."
15211521
}
15221522
15231523
# <NAME> <COMMAND> ...
@@ -1611,7 +1611,7 @@ loot() {
16111611
16121612
[ -z "$_HS_NO_SSRF_169" ] && {
16131613
# Found an SSRF
1614-
echo -e "${CW}TIP:${CN} See ${CB}${CUL}https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf${CN}"
1614+
[ -z "$QUIET" ] && echo -e "${CW}TIP:${CN} See ${CB}${CUL}https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf${CN}"
16151615
[ -n "$_HS_GOT_SSRF_169" ] && {
16161616
# Found and SSRF but could not get infos.
16171617
echo -e "${CW}TIP:${CN} Try ${CDC}dl http://169.254.169.254/openstack${CN}"
@@ -1622,12 +1622,12 @@ loot() {
16221622
command -v tmux >/dev/null && loot_cmd "Tmux" tmux list-s
16231623
16241624
[ "$UID" -gt 0 ] && {
1625-
echo -e "${CW}TIP:${CN} Type ${CDC}sudo -v${CN} and ${CDC}sudo -ln${CN} to list sudo perms. ${CF}[may log to auth.log]${CN}"
1625+
[ -z "$QUIET" ] && echo -e "${CW}TIP:${CN} Type ${CDC}sudo -v${CN} and ${CDC}sudo -ln${CN} to list sudo perms. ${CF}[may log to auth.log]${CN}"
16261626
}
16271627
16281628
lootlight
16291629
unset HOMEDIRARR
1630-
[ -z "$ROOTFS" ] && {
1630+
[ -z "$ROOTFS" ] && [ -z "$QUIET" ] && {
16311631
echo -e "${CW}TIP:${CN} Type ${CDC}lootmore${CN} to loot even more."
16321632
[ -d "/vz/root" ] && echo -e "${CW}VMs found${CN}: Try ${CDC}"'for x in /vz/root/*; do ROOTFS="$x" loot; done'"${CN}"
16331633
}

0 commit comments

Comments
 (0)