diff --git a/modules/exploits/windows/ftp/httpdx_tolog_format.rb b/modules/exploits/windows/ftp/httpdx_tolog_format.rb index 81673b839c..0f1a245562 100644 --- a/modules/exploits/windows/ftp/httpdx_tolog_format.rb +++ b/modules/exploits/windows/ftp/httpdx_tolog_format.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'HTTPDX tolog() Function Format String Vulnerability', 'Description' => %q{ This module exploits a format string vulnerability in HTTPDX FTP server. - By sending an speciall crafted FTP command containing format specifiers, an + By sending an specially crafted FTP command containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user @@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Targets' => [ # - # Automatic targetting via fingerprinting + # Automatic targeting via fingerprinting # [ 'Automatic Targeting', { 'auto' => true } ], @@ -105,7 +105,7 @@ To find a target: 4. follow the xref to the imports area 5. copy/paste the address 6. the 'Writable' value should be anything after the last address IDA shows.. - (preferrably something above 0x0d, to avoid bad chars) + (preferably something above 0x0d, to avoid bad chars) If crashes occur referencing strange values, 'NumPops' probably needs adjusting. For now, that will have to be done manually. diff --git a/modules/exploits/windows/http/httpdx_tolog_format.rb b/modules/exploits/windows/http/httpdx_tolog_format.rb index 097430ef2f..290419cc12 100644 --- a/modules/exploits/windows/http/httpdx_tolog_format.rb +++ b/modules/exploits/windows/http/httpdx_tolog_format.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'HTTPDX tolog() Function Format String Vulnerability', 'Description' => %q{ This module exploits a format string vulnerability in HTTPDX HTTP server. - By sending an speciall crafted HTTP request containing format specifiers, an + By sending an specially crafted HTTP request containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user @@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Targets' => [ # - # Automatic targetting via fingerprinting + # Automatic targeting via fingerprinting # [ 'Automatic Targeting', { 'auto' => true } ], @@ -110,7 +110,7 @@ To find a target: 4. follow the xref to the imports area 5. copy/paste the address 6. the 'Writable' value should be anything after the last address IDA shows.. - (preferrably something above 0x0d, to avoid bad chars) + (preferably something above 0x0d, to avoid bad chars) If crashes occur referencing strange values, 'NumPops' probably needs adjusting. For now, that will have to be done manually.