Skip to content

Commit 5dff043

Browse files
committed
Whitespace
1 parent 09fc52f commit 5dff043

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

lib/msf/base/simple/exploit.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ def self.exploit_simple(oexploit, opts, &block)
6363
exploit = oexploit.replicant
6464
Msf::Simple::Framework.simplify_module( exploit, false )
6565
yield(exploit) if block_given?
66-
66+
6767
# Import options from the OptionStr or Option hash.
6868
exploit._import_extra_options(opts)
6969

@@ -74,14 +74,14 @@ def self.exploit_simple(oexploit, opts, &block)
7474

7575
# Verify the options
7676
exploit.options.validate(exploit.datastore)
77-
77+
7878
# Start it up
7979
driver = ExploitDriver.new(exploit.framework)
8080

8181
# Initialize the driver instance
8282
driver.exploit = exploit
8383
driver.payload = exploit.framework.payloads.create(opts['Payload'])
84-
84+
8585
# Set the force wait for session flag if the caller requested force
8686
# blocking. This is so that passive exploits can be blocked on from
8787
# things like the cli.
@@ -137,9 +137,9 @@ def self.exploit_simple(oexploit, opts, &block)
137137

138138
# Save the job identifier this exploit is running as
139139
exploit.job_id = driver.job_id
140-
140+
141141
# Propagate this back to the caller for console mgmt
142-
oexploit.job_id = exploit.job_id
142+
oexploit.job_id = exploit.job_id
143143
rescue ::Interrupt
144144
exploit.error = $!
145145
raise $!

0 commit comments

Comments
 (0)