Land #8851 s/unknow/unknown/ig

bug/bundler_fix 4.15.7
William Vu 2017-08-18 10:38:50 -05:00
commit 98ba6719e9
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743
5 changed files with 5 additions and 5 deletions

View File

@ -88,7 +88,7 @@ class SnifferSMB < BaseProtocolParser
return "NTLMv1"
end
else
raise RuntimeError, "Unknow hash type"
raise RuntimeError, "Unknown hash type"
end
end

View File

@ -301,7 +301,7 @@ BASE = Rex::Proto::NTLM::Base
end
calculatedhash = self.ntlm2_session(argntlm,optntlm).join[24,24]
else
raise ArgumentError,"ntlm_ver is of unknow type"
raise ArgumentError,"ntlm_ver is of unknown type"
end
hash == calculatedhash
end

View File

@ -459,7 +459,7 @@ class Utils
# Microsoft network server : Server SPN target name validation level is set to <Required from client>
# otherwise it send an STATUS_ACCESS_DENIED packet
if spnopt[:use_spn]
spn= Rex::Text.to_unicode("cifs/#{spnopt[:name] || 'unknow'}")
spn= Rex::Text.to_unicode("cifs/#{spnopt[:name] || 'unknown'}")
addr_list << [9, spn.length].pack('vv') + spn
end

View File

@ -638,7 +638,7 @@ class MetasploitModule < Msf::Auxiliary
elsif nt_len == 0
print_status("Empty hash from #{host} captured, ignoring ... ")
else
print_status("Unknow hash type from #{host}, ignoring ...")
print_status("Unknown hash type from #{host}, ignoring ...")
end
arg[:host] = host

View File

@ -203,7 +203,7 @@ class MetasploitModule < Msf::Auxiliary
# Build the local src hosts cache
if datastore['BIDIRECTIONAL']
print_status("Building the source hosts cache for unknow source hosts...")
print_status("Building the source hosts cache for unknown source hosts...")
@shosts.each do |shost|
if @dsthosts_cache.has_key? shost
vprint_status("Adding #{shost} from destination cache")