From eb76c46ddd4bf5a07a8c7a5374045958ec068a48 Mon Sep 17 00:00:00 2001 From: Michael Schierl Date: Mon, 22 Oct 2012 21:24:36 +0200 Subject: [PATCH] Infohash key cleanups Replace obvious typos in infohash keys. Note that this *does* affect the behaviour as those keys have been ignored before. --- modules/exploits/linux/local/udev_netlink.rb | 2 +- modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/linux/local/udev_netlink.rb b/modules/exploits/linux/local/udev_netlink.rb index 91f560d713..c9fcd64d47 100644 --- a/modules/exploits/linux/local/udev_netlink.rb +++ b/modules/exploits/linux/local/udev_netlink.rb @@ -60,7 +60,7 @@ class Metasploit4 < Msf::Exploit::Local [ 'Linux x64', { 'Arch' => ARCH_X86_64 } ], #[ 'Command payload', { 'Arch' => ARCH_CMD } ], ], - 'DefaultOptons' => { 'WfsDelay' => 2 }, + 'DefaultOptions' => { 'WfsDelay' => 2 }, 'DefaultTarget' => 0, 'DisclosureDate' => "Apr 16 2009", } diff --git a/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb b/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb index fbea3a7691..f9c5a4b47f 100644 --- a/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb +++ b/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb @@ -43,7 +43,7 @@ class Metasploit4 < Msf::Exploit::Remote { 'BadChars' => "\x00\x3a\x3b\x3d\x3c\x3e\x0a\x0d\x22\x26\x27\x2f\x60\xb4", }, - 'Platforms' => [ 'win' ], + 'Platform' => [ 'win' ], 'Targets' => [ [