From 0784370b9879ce0f2eeef496df11f2aa672fbaa3 Mon Sep 17 00:00:00 2001 From: Brent Cook Date: Tue, 20 Oct 2015 13:09:17 -0500 Subject: [PATCH] more typo and whitespace fixes --- modules/post/windows/manage/exec_powershell.rb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/modules/post/windows/manage/exec_powershell.rb b/modules/post/windows/manage/exec_powershell.rb index 6d0c158d65..11b6659f6b 100644 --- a/modules/post/windows/manage/exec_powershell.rb +++ b/modules/post/windows/manage/exec_powershell.rb @@ -30,12 +30,12 @@ class Metasploit3 < Msf::Post register_options( [ - OptString.new( 'SCRIPT', [true, 'Path to the local PS script or command string to execute' ]), + OptString.new( 'SCRIPT', [true, 'Path to the local PS script or command string to execute']), ], self.class) register_advanced_options( [ - OptString.new('SUBSTITUTIONS', [false, 'Script subs in gsub format - original,sub;original,sub' ]), + OptString.new('SUBSTITUTIONS', [false, 'Script subs in gsub format - original,sub;original,sub']), ], self.class) end @@ -47,11 +47,11 @@ class Metasploit3 < Msf::Post raise "Powershell not available" if ! have_powershell? # Preprocess the Powershell::Script object with substitions from Exploit::Powershell - script = make_subs(read_script(datstore['SCRIPT']),process_subs(datastore['SUBSTITUTIONS'])) + script = make_subs(read_script(datastore['SCRIPT']), process_subs(datastore['SUBSTITUTIONS'])) # Execute in session print_status psh_exec(script) - print_good('Finished!') + print_good 'Finished!' end end