Land #5020, spelling fixes for some modules
commit
ef8c0aac69
|
@ -119,7 +119,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
send_header
|
||||
ack = recv_protocol_ack
|
||||
if ack.nil?
|
||||
fail_with(Failure::NoTarget, "#{peer} - Filed to negotiate RMI protocol")
|
||||
fail_with(Failure::NoTarget, "#{peer} - Failed to negotiate RMI protocol")
|
||||
end
|
||||
|
||||
jar = rand_text_alpha(rand(8)+1) + '.jar'
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
Code execution occurs by writing to the All Users Startup Programs directory.
|
||||
You may want to combine this module with the use of multi/handler since a
|
||||
user would have to log for the payloda to execute.
|
||||
user would have to log for the payload to execute.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [ 'jduck' ],
|
||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Racer v0.5.3 Beta 5 Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module explots the Racer Car and Racing Simulator game
|
||||
This module exploits the Racer Car and Racing Simulator game
|
||||
versions v0.5.3 beta 5 and earlier. Both the client and server listen
|
||||
on UDP port 26000. By sending an overly long buffer we are able to
|
||||
execute arbitrary code remotely.
|
||||
|
|
|
@ -129,7 +129,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first)
|
||||
if command.length > 8000
|
||||
# Windows 2008 Command Prompt Max Length is 8191
|
||||
fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
|
||||
fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
|
||||
end
|
||||
print_status("#{peer} - Exploiting through Powershell...")
|
||||
execute_command(command)
|
||||
|
|
|
@ -232,7 +232,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
@addresses = disclose_addresses(my_target)
|
||||
if @addresses.nil?
|
||||
session.railgun.kernel32.CloseHandle(handle)
|
||||
fail_with(Failure::Unknown, "Filed to disclose necessary addresses for exploitation. Aborting.")
|
||||
fail_with(Failure::Unknown, "Failed to disclose necessary addresses for exploitation. Aborting.")
|
||||
else
|
||||
print_good("Addresses successfully disclosed.")
|
||||
end
|
||||
|
|
|
@ -98,7 +98,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, {:remove_comspec => true, :encode_final_payload => true})
|
||||
if command.length > 8000
|
||||
# Windows 2008 Command Prompt Max Length is 8191
|
||||
fail_with(Failure::BadConfig, "#{peer} - The selected paylod is too long to execute through powershell in one command")
|
||||
fail_with(Failure::BadConfig, "#{peer} - The selected payload is too long to execute through powershell in one command")
|
||||
end
|
||||
print_status("#{peer} - Exploiting through Powershell...")
|
||||
exec_bar(datastore['CMDPATH'], command, "\x00")
|
||||
|
|
Loading…
Reference in New Issue