From 9b240e1d8f2511bde27f933908013d532554b2e2 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Mon, 20 Apr 2015 18:41:58 -0500 Subject: [PATCH] Use parenthesis --- modules/auxiliary/gather/android_browser_file_theft.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/auxiliary/gather/android_browser_file_theft.rb b/modules/auxiliary/gather/android_browser_file_theft.rb index 56fd61a810..f0b00f0fe1 100644 --- a/modules/auxiliary/gather/android_browser_file_theft.rb +++ b/modules/auxiliary/gather/android_browser_file_theft.rb @@ -57,7 +57,7 @@ class Metasploit3 < Msf::Auxiliary process_post(cli, request) send_response_html(cli, '') else - print_status("Sending exploit landing page...") + print_status('Sending exploit landing page...') send_response_html(cli, exploit_html) end end @@ -66,7 +66,7 @@ class Metasploit3 < Msf::Auxiliary data = JSON.parse(request.body) contents = hex2bin(data['data']) file = File.basename(data['url']) - print_good "File received: #{(contents.bytesize.to_f/1000).round(2)}kb #{file}" + print_good("File received: #{(contents.bytesize.to_f/1000).round(2)}kb #{file}") loot_path = store_loot( file, 'application/x-sqlite3', @@ -75,7 +75,7 @@ class Metasploit3 < Msf::Auxiliary File.basename(data['url']), "#{cli.peerhost.ljust(16)} Android browser file" ) - print_good "Saved to: #{loot_path}" + print_good("Saved to: #{loot_path}") end