Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix spelling in scripts folder #18673

Merged
merged 1 commit into from
Jan 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions scripts/meterpreter/event_manager.rb
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
"-c" => [ true, "Clear a given Event Log (or ALL if no argument specified)"],
"-f" => [ true, "Event ID to filter events on"],
"-s" => [ true, "Save logs to local CSV file, optionally specify alternate folder in which to save logs"],
"-p" => [ false, "Supress printing filtered logs to screen"]
"-p" => [ false, "Suppress printing filtered logs to screen"]
)


Expand Down Expand Up @@ -91,7 +91,7 @@ def get_log_details
# Function for Printing Event Log Details
#-------------------------------------------------------------------------------
def print_log_details
print_status("Retriving Event Log Configuration")
print_status("Retrieving Event Log Configuration")
tbl = Rex::Text::Table.new(
'Header' => "Event Logs on System",
'Indent' => 1,
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/file_collector.rb
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
def usage
print_line "Meterpreter Script for searching and downloading files that"
print_line "match a specific pattern. First save files to a file, edit and"
print_line("use that same file to download the choosen files.")
print_line("use that same file to download the chosen files.")
print_line(@opts.usage)
raise Rex::Script::Completed
end
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/gettelnet.rb
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
# Create the log directory
::FileUtils.mkdir_p(logs)

# Cleaup script file name
# Cleanup script file name
@dest = logs + "/clean_up_" + filenameinfo + ".rc"

@@exec_opts = Rex::Parser::Arguments.new(
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/hashdump.rb
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ def decrypt_user_keys(hbootkey, users)
lm_exists = user[:V][0x9c+4,4].unpack("V")[0] == 20 ? true : false
nt_exists = user[:V][0x9c+16,4].unpack("V")[0] == 20 ? true : false

#If we have a hashes, then parse them (Note: NT is dependant on LM)
#If we have a hashes, then parse them (Note: NT is dependent on LM)
hashlm_enc = user[:V][hoff + 4, 16] if lm_exists
hashnt_enc = user[:V][(hoff + (lm_exists ? 24 : 8)), 16] if nt_exists

Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/hostsedit.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@


# Meterpreter script for modifying the hosts file in windows
# given a single entrie or several in a file and clear the
# given a single entry or several in a file and clear the
# DNS cache on the target machine.
# This script works with Windows 2000,Windows XP,Windows 2003,
# Windows Vista and Windows 2008.
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/keylogrecorder.rb
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
def usage
print_line("Keylogger Recorder Meterpreter Script")
print_line("This script will start the Meterpreter Keylogger and save all keys")
print_line("in a log file for later anlysis. To stop capture hit Ctrl-C")
print_line("in a log file for later analysis. To stop capture hit Ctrl-C")
print_line("Usage:" + @@exec_opts.usage)
raise Rex::Script::Completed
end
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/multi_console_command.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
#
# Meterpreter script for running multiple console commands on a meterpreter session
# Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
# Verion: 0.1
# Version: 0.1
#

################## Variable Declarations ##################
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/multi_meter_inject.rb
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
# Usage Message Function
#-------------------------------------------------------------------------------
def usage
print_line "Meterpreter script for injecting a reverce tcp Meterpreter payload"
print_line "Meterpreter script for injecting a reverse tcp Meterpreter payload"
print_line "in to memory of multiple PIDs. If none is provided, a notepad process"
print_line "will be created and a Meterpreter payload will be injected in to each."
print_line(@exec_opts.usage)
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/multicommand.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
#Meterpreter script for running multiple commands on Windows 2003, Windows Vista
# and Windows XP and Windows 2008 targets.
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
#Verion: 0.1
#Version: 0.1
################## Variable Declarations ##################
session = client
wininfo = client.sys.config.sysinfo
Expand All @@ -27,7 +27,7 @@
help = 0

################## Function Declarations ##################
# Function for running a list of commands stored in a array, returs string
# Function for running a list of commands stored in a array, returns string
def list_exec(session,cmdlst)
print_status("Running Command List ...")
tmpout = ""
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/multiscript.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

#Meterpreter script for running multiple scripts on a Meterpreter Session
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
#Verion: 0.2
#Version: 0.2
################## Variable Declarations ##################
session = client
# Setting Argument
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/netenum.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
#Meterpreter script for ping sweeps on Windows 2003, Windows Vista
#Windows 2008 and Windows XP targets using native windows commands.
#Provided by Carlos Perez at carlos_perez[at]darkoperator.com
#Verion: 0.1.2
#Version: 0.1.2
#Note:
################## Variable Declarations ##################
@@exec_opts = Rex::Parser::Arguments.new(
Expand Down Expand Up @@ -335,7 +335,7 @@ def message(dest)
elsif hostlist == nil
print_error("Please add a file with host list for DNS forward lookup: -hl <value>")
else
print_error("Something went wront")
print_error("Something went wrong")
end
elsif stdlkp == 1
if dom != nil
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/process_memdump.rb
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@
"-h" => [ false, "Help menu." ],
"-p" => [ true, "PID of process to dump."],
"-n" => [ true, "Name of process to dump."],
"-r" => [ true, "Text file wih list of process names to dump memory for, one per line."],
"-r" => [ true, "Text file with list of process names to dump memory for, one per line."],
"-t" => [ false, "toggle location information in dump."],
"-q" => [false, "Query the size of the Process that would be dump in bytes."]
)
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/remotewinenum.rb
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@
]
################## Function Declarations ##################

# Function for running a list of WMIC commands stored in a array, returs string
# Function for running a list of WMIC commands stored in a array, returns string
def wmicexec(session,wmic,user,pass,trgt)
print_status("Running WMIC Commands ....")
tmpout = ''
Expand Down Expand Up @@ -137,7 +137,7 @@ def headerbuid(session,target,dest)
# Function Help Message
def helpmsg
print("Remote Windows Enumeration Meterpreter Script\n" +
"This script will enumerate windows hosts in the target enviroment\n" +
"This script will enumerate windows hosts in the target environment\n" +
"given a username and password or using the credential under witch\n" +
"Meterpreter is running using WMI wmic windows native tool.\n" +
"Usage:\n" +
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/scheduleme.rb
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
"-l" => [ false,"When a user logs on."],
"-o" => [ true,"Options for executable when upload method used"],
"-s" => [ false,"At system startup."],
"-i" => [ false,"Run command imediatly and only once."],
"-i" => [ false,"Run command immediately and only once."],
"-r" => [ false,"Remote Schedule. Executable has to be already on remote target"],
"-u" => [ false,"Username of account with administrative privelages."],
"-p" => [ false,"Password for account provided."],
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/schtasksabuse.rb
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
#by scheduling and running a list of command against one or more targets
#using schtasks command to run them as system. This script works with Windows XP,
#Windows 2003, Windows Vista and Windows 2008.
#Verion: 0.1.1
#Version: 0.1.1
#Note: in Vista UAC must be disabled to be able to perform scheduling
#and the meterpreter must be running under the profile of local admin
#or system.
Expand Down Expand Up @@ -47,7 +47,7 @@ def abuse(session,targets,commands,username,password,delay)
targets.each do |t|
next if t.strip.length < 1
next if t[0,1] == "#"
#for eacg command
#for each command
commands.each do |c|
next if c.strip.length < 1
next if c[0,1] == "#"
Expand Down
6 changes: 3 additions & 3 deletions scripts/meterpreter/screenspy.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

# Author:Roni Bachar (@roni_bachar) roni.bachar.blog@gmail.com
#
# Thie script will open an interactive view of remote hosts
# This script will open an interactive view of remote hosts
# You will need firefox installed on your machine


Expand Down Expand Up @@ -109,11 +109,11 @@ def wrong_meter_version(meter = meter_type)

if (localsys == "windows")

print_status("Runing in local mode => windows")
print_status("Running in local mode => windows")
print_status("Opening Interactive view...")
localcmd="start firefox -width 530 -height 660 \"file:///#{Msf::Config.install_root}/logs/screenshot/#{host}/video.html\""
else
print_status("Runing in local mode => Linux")
print_status("Running in local mode => Linux")
print_status("Opening Interactive view...")
localcmd="bash firefox -width 530 -height 660 \"file:///#{Msf::Config.install_root}/logs/screenshot/#{host}/video.html\""
end
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/service_manager.rb
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ def priv_check
if not is_uac_enabled? or is_admin?
return true
else
print_error("Insuficient Privileges")
print_error("Insufficient Privileges")
raise Rex::Script::Completed
end

Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/webcam.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
# Author: scriptjunkie
#
# Simplify running webcam, whether grabbing a single frame or running
# a continous loop.
# a continuous loop.

@client = client
opts = Rex::Parser::Arguments.new(
Expand Down
10 changes: 5 additions & 5 deletions scripts/meterpreter/winbf.rb
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@
################## Function Definition ##################
# Function for checking the password policy of current system.
# This policy may resemble the policy of other servers in the
#target enviroment.
#target environment.
def chkpolicy(session)
print_status("Checking password policy...")
output = []
Expand All @@ -54,11 +54,11 @@ def chkpolicy(session)
print_status "\tWARNING Lockout threshold configured, if #{lockout} attempts in #{failcount} minutes account will be locked"
print_status "\tThe account will be locked out for #{lcktime}"
end
# check for password lenght
# check for password length
if minpass.to_s == "0"
print_status "\tNo minimun password lenght is configured"
print_status "\tNo minimum password length is configured"
else
print_status "\tThe minumun password lengh configured is #{minpass}"
print_status "\tThe minimum password length configured is #{minpass}"
print_status "\tyour dictionary should start with passwords of #{minpass} length"
end
rescue ::Exception => e
Expand All @@ -70,7 +70,7 @@ def chkpolicy(session)
# Function for brute forcing passwords using windows native tools
def passbf(session,passlist,target,user,opt,logfile)
print_status("Running Brute force attack against #{user}")
print_status("Successfull Username and Password pairs are being saved in #{logfile}")
print_status("Successful Username and Password pairs are being saved in #{logfile}")
result = []
output = []
passfnd = 0
Expand Down
6 changes: 3 additions & 3 deletions scripts/meterpreter/winenum.rb
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@
'wbem\\wmic.exe',
'netsh.exe',
]
# Executables not pressent in Windows 2000
# Executables not present in Windows 2000
nowin2kexe = [
'netsh.exe',
'gpresult.exe',
Expand Down Expand Up @@ -186,7 +186,7 @@ def chkvm()
info = @client.sys.config.sysinfo
print_status "Checking if #{info['Computer']} is a Virtual Machine ........"

# Check for Target Machines if running in VM, only fo VMware Workstation/Fusion
# Check for Target Machines if running in VM, only for VMware Workstation/Fusion
begin
key = 'HKLM\\HARDWARE\\DESCRIPTION\\System\\BIOS'
root_key, base_key = @client.sys.registry.splitkey(key)
Expand Down Expand Up @@ -338,7 +338,7 @@ def gethash()
print_status("Hashes Dumped")
rescue ::Exception => e
print_status("\tError dumping hashes: #{e.class} #{e}")
print_status("\tPayload may be running with insuficient privileges!")
print_status("\tPayload may be running with insufficient privileges!")
end
flname = "#{@logfol}/hashdump.txt"
file_local_write(flname,hash)
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/wmic.rb
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@
outfile = nil

################## Function Declarations ##################
# Function for running a list of WMIC commands stored in a array, returs string
# Function for running a list of WMIC commands stored in a array, returns string
def wmicexec(session,wmiccmds= nil)
tmpout = ''
session.response_timeout=120
Expand Down
2 changes: 1 addition & 1 deletion scripts/resource/auto_cred_checker.rc
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@

# This Metasploit RC-File could be used to automatically check already discovered
# credentials against some other login services.
# It uses allready discovered credential from the database and tries to use them against some
# It uses already discovered credential from the database and tries to use them against some
# other services

<ruby>
Expand Down
2 changes: 1 addition & 1 deletion scripts/resource/autocrawler.rc
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Author: m-1-k-3 (Web: http://www.s3cur1ty.de / Twitter: @s3cur1ty_de)

# This Metasploit RC-File could be used to crawl webapps automatically
# it uses the allready discovered webservers - "services -s http" / "services -s https"
# it uses the already discovered webservers - "services -s http" / "services -s https"
# you could use db_nmap or http_version for discovering the werbservers
# some basic jobhandling to not kill our own machine is included - check the maxjobs and threadspercrawler variables

Expand Down
2 changes: 1 addition & 1 deletion scripts/resource/basic_discovery.rc
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Author: m-1-k-3 (Web: http://www.s3cur1ty.de / Twitter: @s3cur1ty_de)

# This Metasploit RC-File could be used to portscan the network via nmap or via the internal portscanner module
# it also uses the udp_sweep module and some more metasploit modules for getting more infos ans vulns
# it also uses the udp_sweep module and some more metasploit modules for getting more infos and vulns
# RHOSTS is used from the global datastore
# VERBOSE is used from the global datastore
# you can define your own Nmap options via the global NMAPOPTS variable
Expand Down