Fix messages /successfuly/successfully

GSoC/Meterpreter_Web_Console
Jacob Robles 2019-01-09 06:32:22 -06:00
parent f77eab1522
commit 0c984fa232
No known key found for this signature in database
GPG Key ID: 3EC9F18F2B12401C
5 changed files with 5 additions and 5 deletions

View File

@ -104,7 +104,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY']) output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
# Report output # Report output
print_good("Command completed successfuly!") print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n") print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n") print_line("#{output}\n")
report_note( report_note(

View File

@ -72,7 +72,7 @@ class MetasploitModule < Msf::Auxiliary
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY']) output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
unless output.nil? unless output.nil?
print_good("Command completed successfuly!") print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n") print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n") print_line("#{output}\n")
report_note( report_note(

View File

@ -136,7 +136,7 @@ class MetasploitModule < Msf::Exploit::Remote
payload_url = "" payload_url = ""
@payload_path = "" @payload_path = ""
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/ if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
print_good("Payload uploaded successfuly") print_good("Payload uploaded successfully")
else else
print_error("Payload upload failed") print_error("Payload upload failed")
return return

View File

@ -85,7 +85,7 @@ EOS
ring0_code = ring0_code =
#"\xcc" + #"\xcc" +
# save registers -- necessary for successfuly recovery # save registers -- necessary for successfully recovery
"\x60" + "\x60" +
# get EPROCESS from ETHREAD # get EPROCESS from ETHREAD
"\x64\xa1\x24\x01\x00\x00" + "\x64\xa1\x24\x01\x00\x00" +

View File

@ -103,7 +103,7 @@ class MetasploitModule < Msf::Post
if !recovery_key.nil? if !recovery_key.nil?
recovery_key = recovery_key[1] recovery_key = recovery_key[1]
id_key_tmp = id_key_tmp[1] id_key_tmp = id_key_tmp[1]
print_good("Recovery key generated successfuly : #{recovery_key}") print_good("Recovery key generated successfully : #{recovery_key}")
else else
print_error('Recovery Key generation failed') print_error('Recovery Key generation failed')
print_status('No recovery key can be used') print_status('No recovery key can be used')