Fix additional typos per recomendation
parent
b8f0a94c3f
commit
fea84cad10
|
@ -123,7 +123,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
)
|
||||
end
|
||||
|
||||
# Function for Creating persistent script
|
||||
# Creates persistent script
|
||||
#-------------------------------------------------------------------------------
|
||||
def create_script(delay, altexe)
|
||||
if not altexe.nil?
|
||||
|
@ -159,7 +159,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
return logfile
|
||||
end
|
||||
|
||||
# Function for writing script to target host
|
||||
# Writes script to target host
|
||||
#-------------------------------------------------------------------------------
|
||||
def write_script_to_target(vbs,name)
|
||||
tempdir = session.fs.file.expand_path("%TEMP%")
|
||||
|
@ -182,7 +182,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
return tempvbs
|
||||
end
|
||||
|
||||
# Function to execute script on target and return the PID of the process
|
||||
# Executes script on target and return the PID of the process
|
||||
#-------------------------------------------------------------------------------
|
||||
def target_exec(script_on_target)
|
||||
execsuccess = true
|
||||
|
@ -201,7 +201,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
return execsuccess
|
||||
end
|
||||
|
||||
# Function to install payload in to the registry HKLM or HKCU
|
||||
# Installs payload in to the registry HKLM or HKCU
|
||||
#-------------------------------------------------------------------------------
|
||||
def write_to_reg(key,script_on_target, registry_value)
|
||||
# Lets start to assume we had success.
|
||||
|
@ -228,7 +228,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
end
|
||||
end
|
||||
|
||||
# Function for writing executable to target host
|
||||
# Writesexecutable to target host
|
||||
#-------------------------------------------------------------------------------
|
||||
def write_exe_to_target(exe_raw, rexename)
|
||||
if rexename.nil?
|
||||
|
|
Loading…
Reference in New Issue