From 4f9ed0e4e923cfeb6bf1fadb669aeb07c6ca462d Mon Sep 17 00:00:00 2001 From: Joshua Drake Date: Mon, 16 Aug 2010 17:12:16 +0000 Subject: [PATCH] style compliance fixes git-svn-id: file:///home/svn/framework3/trunk@10022 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/windows/smb/psexec.rb | 2 +- modules/exploits/windows/smb/smb_relay.rb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/smb/psexec.rb b/modules/exploits/windows/smb/psexec.rb index e5dc4955f8..08eb1c1648 100644 --- a/modules/exploits/windows/smb/psexec.rb +++ b/modules/exploits/windows/smb/psexec.rb @@ -126,7 +126,7 @@ class Metasploit3 < Msf::Exploit::Remote fd = simple.open("\\#{filename}", 'rwct') exe = '' if (datastore['PAYLOAD'].include? 'x64') - exe = Msf::Util::EXE.to_win64pe_service(framework, payload.encoded, + exe = Msf::Util::EXE.to_win64pe_service(framework, payload.encoded, { :servicename => servicename }) diff --git a/modules/exploits/windows/smb/smb_relay.rb b/modules/exploits/windows/smb/smb_relay.rb index 6f2a6c53b9..292468d447 100644 --- a/modules/exploits/windows/smb/smb_relay.rb +++ b/modules/exploits/windows/smb/smb_relay.rb @@ -142,7 +142,7 @@ class Metasploit3 < Msf::Exploit::Remote fd = rclient.open("\\#{filename}", 'rwct') fd << Msf::Util::EXE.to_win32pe_service(framework, code.encoded, { - :servicename => rand_text_alpha(8) + :servicename => rand_text_alpha(8) }) fd.close print_status("Created \\#{filename}...")