Skip to content

Commit

Permalink
Land #11215, success
Browse files Browse the repository at this point in the history
  • Loading branch information
busterb committed Jan 10, 2019
2 parents aaaca59 + 307cc8c commit 9f8bac5
Show file tree
Hide file tree
Showing 5 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/ms17_010_command.rb
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ def smb_pwn(ip)
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])

# Report output
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(
Expand Down
2 changes: 1 addition & 1 deletion modules/auxiliary/admin/smb/psexec_command.rb
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ def run_host(ip)
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])

unless output.nil?
print_good("Command completed successfuly!")
print_good("Command completed successfully!")
print_status("Output for \"#{datastore['COMMAND']}\":\n")
print_line("#{output}\n")
report_note(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -136,7 +136,7 @@ def exploit
payload_url = ""
@payload_path = ""
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
print_good("Payload uploaded successfuly")
print_good("Payload uploaded successfully")
else
print_error("Payload upload failed")
return
Expand Down
2 changes: 1 addition & 1 deletion modules/post/windows/escalate/ms10_073_kbdlayout.rb
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ def run

ring0_code =
#"\xcc" +
# save registers -- necessary for successfuly recovery
# save registers -- necessary for successful recovery
"\x60" +
# get EPROCESS from ETHREAD
"\x64\xa1\x24\x01\x00\x00" +
Expand Down
2 changes: 1 addition & 1 deletion modules/post/windows/gather/bitlocker_fvek.rb
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ def run
if !recovery_key.nil?
recovery_key = recovery_key[1]
id_key_tmp = id_key_tmp[1]
print_good("Recovery key generated successfuly : #{recovery_key}")
print_good("Recovery key generated successfully : #{recovery_key}")
else
print_error('Recovery Key generation failed')
print_status('No recovery key can be used')
Expand Down

0 comments on commit 9f8bac5

Please sign in to comment.