Whitespace

bug/bundler_fix
James Lee 2016-06-10 16:36:35 -05:00
parent 07f7e5e148
commit b3f59ebd19
No known key found for this signature in database
GPG Key ID: 2D6094C7CEA0A321
2 changed files with 197 additions and 200 deletions

View File

@ -2,7 +2,6 @@
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/mssql_commands' require 'msf/core/exploit/mssql_commands'
module Msf module Msf
### ###
@ -23,7 +22,7 @@ module Exploit::Remote::MSSQL
ENCRYPT_NOT_SUP = 0x02 #Encryption is not available. ENCRYPT_NOT_SUP = 0x02 #Encryption is not available.
ENCRYPT_REQ = 0x03 #Encryption is required. ENCRYPT_REQ = 0x03 #Encryption is required.
# Paquet Type # Packet Type
TYPE_SQL_BATCH = 1 # (Client) SQL command TYPE_SQL_BATCH = 1 # (Client) SQL command
TYPE_PRE_TDS7_LOGIN = 2 # (Client) Pre-login with version < 7 (unused) TYPE_PRE_TDS7_LOGIN = 2 # (Client) Pre-login with version < 7 (unused)
TYPE_RPC = 3 # (Client) RPC TYPE_RPC = 3 # (Client) RPC
@ -43,7 +42,6 @@ module Exploit::Remote::MSSQL
STATUS_RESETCONNECTION = 0x08 # TDS 7.1+ STATUS_RESETCONNECTION = 0x08 # TDS 7.1+
STATUS_RESETCONNECTIONSKIPTRAN = 0x10 # TDS 7.3+ STATUS_RESETCONNECTIONSKIPTRAN = 0x10 # TDS 7.3+
# #
# Creates an instance of a MSSQL exploit module. # Creates an instance of a MSSQL exploit module.
# #
@ -88,7 +86,6 @@ module Exploit::Remote::MSSQL
'MsfExploit' => self, 'MsfExploit' => self,
}) })
ping_sock.put("\x02") ping_sock.put("\x02")
resp, _saddr, _sport = ping_sock.recvfrom(65535, timeout) resp, _saddr, _sport = ping_sock.recvfrom(65535, timeout)
ping_sock.close ping_sock.close