diff --git a/modules/auxiliary/admin/smb/ms17_010_command.rb b/modules/auxiliary/admin/smb/ms17_010_command.rb index e866c39653..1b5430c21b 100644 --- a/modules/auxiliary/admin/smb/ms17_010_command.rb +++ b/modules/auxiliary/admin/smb/ms17_010_command.rb @@ -104,7 +104,7 @@ class MetasploitModule < Msf::Auxiliary output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY']) # Report output - print_good("Command completed successfuly!") + print_good("Command completed successfully!") print_status("Output for \"#{datastore['COMMAND']}\":\n") print_line("#{output}\n") report_note( diff --git a/modules/auxiliary/admin/smb/psexec_command.rb b/modules/auxiliary/admin/smb/psexec_command.rb index 7b08762c04..ccac432747 100644 --- a/modules/auxiliary/admin/smb/psexec_command.rb +++ b/modules/auxiliary/admin/smb/psexec_command.rb @@ -72,7 +72,7 @@ class MetasploitModule < Msf::Auxiliary output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY']) unless output.nil? - print_good("Command completed successfuly!") + print_good("Command completed successfully!") print_status("Output for \"#{datastore['COMMAND']}\":\n") print_line("#{output}\n") report_note( diff --git a/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb b/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb index 35a1a87030..a9e6bc5560 100644 --- a/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb +++ b/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb @@ -136,7 +136,7 @@ class MetasploitModule < Msf::Exploit::Remote payload_url = "" @payload_path = "" if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/ - print_good("Payload uploaded successfuly") + print_good("Payload uploaded successfully") else print_error("Payload upload failed") return diff --git a/modules/post/windows/escalate/ms10_073_kbdlayout.rb b/modules/post/windows/escalate/ms10_073_kbdlayout.rb index 53446e6633..42b250f1ce 100644 --- a/modules/post/windows/escalate/ms10_073_kbdlayout.rb +++ b/modules/post/windows/escalate/ms10_073_kbdlayout.rb @@ -85,7 +85,7 @@ EOS ring0_code = #"\xcc" + - # save registers -- necessary for successfuly recovery + # save registers -- necessary for successfully recovery "\x60" + # get EPROCESS from ETHREAD "\x64\xa1\x24\x01\x00\x00" + diff --git a/modules/post/windows/gather/bitlocker_fvek.rb b/modules/post/windows/gather/bitlocker_fvek.rb index 6566dd657d..deeb829443 100644 --- a/modules/post/windows/gather/bitlocker_fvek.rb +++ b/modules/post/windows/gather/bitlocker_fvek.rb @@ -103,7 +103,7 @@ class MetasploitModule < Msf::Post if !recovery_key.nil? recovery_key = recovery_key[1] id_key_tmp = id_key_tmp[1] - print_good("Recovery key generated successfuly : #{recovery_key}") + print_good("Recovery key generated successfully : #{recovery_key}") else print_error('Recovery Key generation failed') print_status('No recovery key can be used')