Minor cleanup

bug/bundler_fix
David Maloney 2012-10-31 16:14:34 -05:00
parent 86f6d59d2e
commit dd7ab11e38
3 changed files with 3 additions and 3 deletions

View File

@ -178,7 +178,7 @@ module Exploit::Remote::WinRM
rxml = REXML::Document.new(xml).root
rxml.elements.to_a("//rsp:Stream").each do |node|
next if node.text.nil?
streams[node.attributes['Name']] << Rex::Text.base64_decode(node.text)
streams[node.attributes['Name']] << Rex::Text.decode_base64(node.text)
end
return streams
end

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
works only if the remote end allows Negotiate(NTLM) authentication.
Kerberos is not currently supported. Please note: in order to use this
module without SSL, the 'AllowUnencrypted' winrm option must be set.
Otherwise adjsut the port and set the SSL options in the module as appropriate.
Otherwise adjust the port and set the SSL options in the module as appropriate.
},
'Author' => [ 'thelightcosine' ],
'References' =>

View File

@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'WinRM Powershell Remote Code Execution',
'Description' => %q{
This module uses valid redentials to login to the WinRM service
This module uses valid credentials to login to the WinRM service
and execute a payload as a powershell script. It then attempts to
automigrate before the WinRS shell dies.