Skip to content

Commit 264d3f9

Browse files
author
Tod Beardsley
committed
Minor grammar fixes on modules
1 parent 6d966db commit 264d3f9

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

modules/auxiliary/admin/kerberos/ms14_068_kerberos_checksum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a vulnerability in the Microsoft Kerberos implementation. The problem
1919
exists in the verification of the Privilege Attribute Certificate (PAC) from a Kerberos TGS
20-
request, where a domain user is allowed to forge a PAC with arbitrary privileges, including
20+
request, where a domain user may forge a PAC with arbitrary privileges, including
2121
Domain Administrator. This module requests a TGT ticket with a forged PAC and exports it to
2222
a MIT Kerberos Credential Cache file. It can be loaded on Windows systems with the Mimikatz
2323
help. It has been tested successfully on Windows 2008.

modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info={})
1616
super(update_info(info,
1717
'Name' => 'Android Browser "Open in New Tab" Cookie Theft',
1818
'Description' => %q{
19-
In Android (AOSP)'s Browser application and WebView component the
19+
In Android's stock AOSP Browser application and WebView component, the
2020
"open in new tab" functionality allows a file URL to be opened. On
2121
versions of Android before 4.4, the path to the sqlite cookie
2222
database could be specified. By saving a cookie containing a <script>

modules/exploits/linux/local/desktop_privilege_escalation.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,15 +21,15 @@ def initialize(info={})
2121
This module steals the user password of an administrative user on a desktop Linux system
2222
when it is entered for unlocking the screen or for doing administrative actions using
2323
policykit. Then it escalates to root privileges using sudo and the stolen user password.
24-
It exploits the design weakness that there is no trusted channell for transferring the
24+
It exploits the design weakness that there is no trusted channel for transferring the
2525
password from the keyboard to the actual password verificatition against the shadow file
2626
(which is running as root since /etc/shadow is only readable to the root user). Both
2727
screensavers (xscreensaver/gnome-screensaver) and policykit use a component running under
2828
the current user account to query for the password and then pass it to a setuid-root binary
29-
to do the password verification. Therefore it is possible to inject a password stealer
29+
to do the password verification. Therefore, it is possible to inject a password stealer
3030
after compromising the user account. Since sudo requires only the user password (and not
3131
the root password of the system), stealing the user password of an administrative user
32-
directly allows escalating to root privileges. Please note that you have to start a handler
32+
directly allows escalating to root privileges. Please note, you have to start a handler
3333
as a background job before running this exploit since the exploit will only create a shell
3434
when the user actually enters the password (which may be hours after launching the exploit).
3535
Using exploit/multi/handler with the option ExitOnSession set to false should do the job.

modules/post/windows/recon/outbound_ports.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info={})
1818
This module makes some kind of TCP traceroute to get outbound-filtering rules.
1919
It will try to make a TCP connection to a certain public IP address (this IP
2020
does not need to be under your control) using different TTL incremental values.
21-
This way if you get an answer (ICMP ttl time exceeded packet) from a public IP
21+
This way if you get an answer (ICMP TTL time exceeded packet) from a public IP
2222
device you can infer that the destination port is allowed. Setting STOP to
2323
true the module will stop as soon as you reach a public IP (this will generate
2424
less noise in the network).

0 commit comments

Comments
 (0)