diff --git a/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb b/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb index 1ff5f1f61a..97752bb783 100644 --- a/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb +++ b/modules/exploits/linux/madwifi/madwifi_giwscan_cb.rb @@ -46,7 +46,7 @@ documentation (external/ruby-lorcon/README) for more information. 'Laurent Butti <0x9090 at gmail.com>' ], 'License' => MSF_LICENSE, - 'Version' => '', + 'Version' => '$Revision$', 'Targets' => [ ['Ubuntu 6.10', { 'JMPESP' => 0xffffe777, 'scan_iterate_ra' => "0x8014401" }], @@ -353,4 +353,4 @@ end return frame end -end \ No newline at end of file +end diff --git a/modules/payloads/singles/linux/x86/chmod.rb b/modules/payloads/singles/linux/x86/chmod.rb index cebf42d4bb..9c24737d9f 100644 --- a/modules/payloads/singles/linux/x86/chmod.rb +++ b/modules/payloads/singles/linux/x86/chmod.rb @@ -13,7 +13,7 @@ module Metasploit3 def initialize(info = {}) super(merge_info(info, 'Name' => 'Linux Chmod', - 'Version' => '1', + 'Version' => '$Revision$', 'Description' => 'Runs chmod on specified file with specified mode', 'Author' => 'Kris Katterjohn ', 'License' => BSD_LICENSE, @@ -38,4 +38,4 @@ module Metasploit3 "\x5b" + Rex::Arch::X86.push_dword(mode) + "\x59\xcd\x80\x6a\x01\x58\xcd\x80"; end -end \ No newline at end of file +end diff --git a/modules/payloads/stages/windows/reflectivevncinject.rb b/modules/payloads/stages/windows/reflectivevncinject.rb index 9713944aa2..5dc7ae2826 100644 --- a/modules/payloads/stages/windows/reflectivevncinject.rb +++ b/modules/payloads/stages/windows/reflectivevncinject.rb @@ -16,7 +16,7 @@ module Metasploit3 def initialize(info = {}) super(update_info(info, 'Name' => 'Reflective VNC Dll Injection', - 'Version' => '0.1', + 'Version' => '$Revision$', 'Description' => 'Inject a VNC Dll via a reflective loader', 'Author' => [ 'Stephen Fewer ' ], 'Session' => Msf::Sessions::VncInject ))