From be829e77ba433561f36c2632ea88e72a590da2b0 Mon Sep 17 00:00:00 2001 From: root Date: Fri, 3 Apr 2015 16:25:18 +0500 Subject: [PATCH] cravis error solve --- modules/auxiliary/fuzzers/ftp/client_ftp.rb | 3 +-- modules/auxiliary/gather/enum_dns.rb | 9 ++++----- 2 files changed, 5 insertions(+), 7 deletions(-) diff --git a/modules/auxiliary/fuzzers/ftp/client_ftp.rb b/modules/auxiliary/fuzzers/ftp/client_ftp.rb index 9cef8fb507..30e3e7e971 100644 --- a/modules/auxiliary/fuzzers/ftp/client_ftp.rb +++ b/modules/auxiliary/fuzzers/ftp/client_ftp.rb @@ -46,8 +46,7 @@ class Metasploit3 < Msf::Auxiliary # Not compatible today def support_ipv6? false - end - + end def setup super @state = {} diff --git a/modules/auxiliary/gather/enum_dns.rb b/modules/auxiliary/gather/enum_dns.rb index 01dfd406fd..8c25793fae 100644 --- a/modules/auxiliary/gather/enum_dns.rb +++ b/modules/auxiliary/gather/enum_dns.rb @@ -69,8 +69,7 @@ class Metasploit3 < Msf::Auxiliary end end end - end - + end def wildcard(target) rendsub = rand(10000).to_s query = @res.query("#{rendsub}.#{target}", "A") @@ -84,7 +83,7 @@ class Metasploit3 < Msf::Auxiliary return false end end - + def genrcd(target) print_status("Retrieving general DNS records") query = @res.search(target) @@ -166,7 +165,7 @@ class Metasploit3 < Msf::Auxiliary end end end - + def tldexpnd(targetdom,nssrv) target = targetdom.scan(/(\S*)[.]\w*\z/).join target.chomp! @@ -323,7 +322,7 @@ class Metasploit3 < Msf::Auxiliary tl.delete_if { |t| not t.alive? } end end - + # SRV Record Enumeration def srvqry(dom,nssrv) print_status("Enumerating SRV records for #{dom}")