Minor fixes. Includes a test module.

bug/bundler_fix
Tod Beardsley 2014-03-10 14:49:45 -05:00
parent 26be236896
commit 2086224a4c
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
2 changed files with 5 additions and 5 deletions

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
developer." To work around this issue, you will need to manually build and sign developer." To work around this issue, you will need to manually build and sign
an OSX app containing your payload with a custom URL handler called "openurl". an OSX app containing your payload with a custom URL handler called "openurl".
You can put newlines & unicode in your APP_NAME, although you must be careful not You can put newlines and unicode in your APP_NAME, although you must be careful not
to create a prompt that is too tall, or the user will not be able to click to create a prompt that is too tall, or the user will not be able to click
the buttons, and will have to either logout or kill the CoreServicesUIAgent the buttons, and will have to either logout or kill the CoreServicesUIAgent
process. process.

View File

@ -12,13 +12,13 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => "heaplib2 test", 'Name' => "Heaplib2 Test",
'Description' => %q{ 'Description' => %q{
This tests heaplib2 This tests heaplib2. Since it is a test module, it's not intended to do much useful work in the field.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'sinn3r' ], 'Author' => [ 'sinn3r' ],
'References' => 'References' =>
[ [
[ 'URL', 'http://metasploit.com' ] [ 'URL', 'http://metasploit.com' ]
], ],
@ -79,4 +79,4 @@ class Metasploit3 < Msf::Auxiliary
exploit exploit
end end
end end