Fix messages /successfuly/successfully

GSoC/Meterpreter_Web_Console
Jacob Robles 2019-01-09 06:32:22 -06:00
parent f77eab1522
commit 0c984fa232
No known key found for this signature in database
GPG Key ID: 3EC9F18F2B12401C
5 changed files with 5 additions and 5 deletions

View File

@ -104,7 +104,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
# Report output
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(

View File

@ -72,7 +72,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
unless output.nil?
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(

View File

@ -136,7 +136,7 @@ class MetasploitModule < Msf::Exploit::Remote
payload_url = ""
@payload_path = ""
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
print_good("Payload uploaded successfuly")
print_good("Payload uploaded successfully")
else
print_error("Payload upload failed")
return

View File

@ -85,7 +85,7 @@ EOS
ring0_code =
#"\xcc" +
# save registers -- necessary for successfuly recovery
# save registers -- necessary for successfully recovery
"\x60" +
# get EPROCESS from ETHREAD
"\x64\xa1\x24\x01\x00\x00" +

View File

@ -103,7 +103,7 @@ class MetasploitModule < Msf::Post
if !recovery_key.nil?
recovery_key = recovery_key[1]
id_key_tmp = id_key_tmp[1]
print_good("Recovery key generated successfuly : #{recovery_key}")
print_good("Recovery key generated successfully : #{recovery_key}")
else
print_error('Recovery Key generation failed')
print_status('No recovery key can be used')