From 9dae361383338859a57f18d715894c2b4c383a06 Mon Sep 17 00:00:00 2001 From: Joshua Drake Date: Thu, 16 Sep 2010 16:23:46 +0000 Subject: [PATCH] typo fixes git-svn-id: file:///home/svn/framework3/trunk@10332 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/windows/iis/ms01_026_dbldecode.rb | 2 +- modules/exploits/windows/smb/ms08_067_netapi.rb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/iis/ms01_026_dbldecode.rb b/modules/exploits/windows/iis/ms01_026_dbldecode.rb index c4fd894449..27586df981 100644 --- a/modules/exploits/windows/iis/ms01_026_dbldecode.rb +++ b/modules/exploits/windows/iis/ms01_026_dbldecode.rb @@ -15,7 +15,7 @@ require 'rex/proto/tftp' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking - # NOTE: This cannot be an HttpClient module since the resposne from the server + # NOTE: This cannot be an HttpClient module since the response from the server # is not a valid HttpResponse include Msf::Exploit::Remote::Tcp include Msf::Exploit::CmdStagerTFTP diff --git a/modules/exploits/windows/smb/ms08_067_netapi.rb b/modules/exploits/windows/smb/ms08_067_netapi.rb index 691dcdfad0..e03c0bc352 100644 --- a/modules/exploits/windows/smb/ms08_067_netapi.rb +++ b/modules/exploits/windows/smb/ms08_067_netapi.rb @@ -937,7 +937,7 @@ class Metasploit3 < Msf::Exploit::Remote NDR.long(4097) + NDR.long(0) - # NOTE: we don't bother waiting for a resposne here... + # NOTE: we don't bother waiting for a response here... print_status("Attempting to trigger the vulnerability...") dcerpc.call(0x1f, stub, false)