From 97d3a20f82b8469b590d4c2302c3ded66b69c8a1 Mon Sep 17 00:00:00 2001 From: James Lee Date: Tue, 17 Sep 2013 10:46:10 -0500 Subject: [PATCH] Remove more $Revision tags --- lib/msf/core/exploit/omelet.rb | 2 -- lib/msf/core/payload/osx/bundleinject.rb | 1 - lib/msf/core/payload/windows/dllinject.rb | 1 - lib/msf/core/payload/windows/exec.rb | 1 - lib/msf/core/payload/windows/loadlibrary.rb | 1 - lib/msf/core/payload/windows/reflectivedllinject.rb | 1 - lib/msf/core/payload/windows/x64/reflectivedllinject.rb | 1 - scripts/meterpreter/enum_putty.rb | 1 - scripts/meterpreter/screen_unlock.rb | 2 -- scripts/meterpreter/service_permissions_escalate.rb | 1 - 10 files changed, 12 deletions(-) diff --git a/lib/msf/core/exploit/omelet.rb b/lib/msf/core/exploit/omelet.rb index e5945812a6..9496749ed2 100644 --- a/lib/msf/core/exploit/omelet.rb +++ b/lib/msf/core/exploit/omelet.rb @@ -11,8 +11,6 @@ module Msf # # written by corelanc0d3r # -# Version: $Revision$ -# ### module Exploit::Omelet diff --git a/lib/msf/core/payload/osx/bundleinject.rb b/lib/msf/core/payload/osx/bundleinject.rb index d327374ea3..a104b91c3f 100644 --- a/lib/msf/core/payload/osx/bundleinject.rb +++ b/lib/msf/core/payload/osx/bundleinject.rb @@ -14,7 +14,6 @@ module Payload::Osx::BundleInject def initialize(info = {}) super(update_info(info, 'Name' => 'Mac OS X Inject Mach-O Bundle', - 'Version' => '$Revision$', 'Description' => 'Inject a custom Mach-O bundle into the exploited process', 'Author' => [ diff --git a/lib/msf/core/payload/windows/dllinject.rb b/lib/msf/core/payload/windows/dllinject.rb index 99d193adf4..fc9a7e2908 100644 --- a/lib/msf/core/payload/windows/dllinject.rb +++ b/lib/msf/core/payload/windows/dllinject.rb @@ -16,7 +16,6 @@ module Payload::Windows::DllInject def initialize(info = {}) super(update_info(info, 'Name' => 'Windows Inject DLL', - 'Version' => '$Revision$', 'Description' => 'Inject a custom DLL into the exploited process', 'Author' => [ diff --git a/lib/msf/core/payload/windows/exec.rb b/lib/msf/core/payload/windows/exec.rb index 5e3f9b510a..8f3cc6d73d 100644 --- a/lib/msf/core/payload/windows/exec.rb +++ b/lib/msf/core/payload/windows/exec.rb @@ -16,7 +16,6 @@ module Payload::Windows::Exec def initialize(info = {}) super(update_info(info, 'Name' => 'Windows Execute Command', - 'Version' => '$Revision$', 'Description' => 'Execute an arbitrary command', 'Author' => [ 'vlad902', 'sf' ], 'License' => MSF_LICENSE, diff --git a/lib/msf/core/payload/windows/loadlibrary.rb b/lib/msf/core/payload/windows/loadlibrary.rb index dc128e3d18..74ada40e56 100644 --- a/lib/msf/core/payload/windows/loadlibrary.rb +++ b/lib/msf/core/payload/windows/loadlibrary.rb @@ -16,7 +16,6 @@ module Payload::Windows::LoadLibrary def initialize(info = {}) super(update_info(info, 'Name' => 'Windows LoadLibrary Path', - 'Version' => '$Revision$', 'Description' => 'Load an arbitrary library path', 'Author' => [ 'sf', 'hdm' ], 'License' => MSF_LICENSE, diff --git a/lib/msf/core/payload/windows/reflectivedllinject.rb b/lib/msf/core/payload/windows/reflectivedllinject.rb index c0e2db1950..cf56ecdfa2 100644 --- a/lib/msf/core/payload/windows/reflectivedllinject.rb +++ b/lib/msf/core/payload/windows/reflectivedllinject.rb @@ -20,7 +20,6 @@ module Payload::Windows::ReflectiveDllInject def initialize(info = {}) super(update_info(info, 'Name' => 'Reflective DLL Injection', - 'Version' => '$Revision$', 'Description' => 'Inject a DLL via a reflective loader', 'Author' => [ 'sf' ], 'References' => [ [ 'URL', 'https://github.com/stephenfewer/ReflectiveDLLInjection' ] ], diff --git a/lib/msf/core/payload/windows/x64/reflectivedllinject.rb b/lib/msf/core/payload/windows/x64/reflectivedllinject.rb index 3e37820d7d..292d63a87f 100644 --- a/lib/msf/core/payload/windows/x64/reflectivedllinject.rb +++ b/lib/msf/core/payload/windows/x64/reflectivedllinject.rb @@ -20,7 +20,6 @@ module Payload::Windows::ReflectiveDllInject_x64 def initialize(info = {}) super(update_info(info, 'Name' => 'Reflective DLL Injection', - 'Version' => '$Revision$', 'Description' => 'Inject a DLL via a reflective loader', 'Author' => [ 'sf' ], 'References' => [ [ 'URL', 'https://github.com/stephenfewer/ReflectiveDLLInjection' ] ], diff --git a/scripts/meterpreter/enum_putty.rb b/scripts/meterpreter/enum_putty.rb index a46fc99942..886dac8eed 100644 --- a/scripts/meterpreter/enum_putty.rb +++ b/scripts/meterpreter/enum_putty.rb @@ -2,7 +2,6 @@ # Meterpreter script for enumerating putty connections # Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com # -# $Revision$ @client = client #Options and Option Parsing opts = Rex::Parser::Arguments.new( diff --git a/scripts/meterpreter/screen_unlock.rb b/scripts/meterpreter/screen_unlock.rb index 2a4ca520e9..20827248aa 100644 --- a/scripts/meterpreter/screen_unlock.rb +++ b/scripts/meterpreter/screen_unlock.rb @@ -5,8 +5,6 @@ # # Based on the winlockpwn tool released by Metlstorm: http://www.storm.net.nz/projects/16 # -# $Revision$ -# revert = false targets = [ diff --git a/scripts/meterpreter/service_permissions_escalate.rb b/scripts/meterpreter/service_permissions_escalate.rb index 8941f033d1..1ee4f22d5a 100644 --- a/scripts/meterpreter/service_permissions_escalate.rb +++ b/scripts/meterpreter/service_permissions_escalate.rb @@ -9,7 +9,6 @@ # # scriptjunkie googlemail com # -# $Revision$ ## if client.platform !~ /win32/