Skip to content

Commit bd7ea1f

Browse files
committed
more updates, 465 more pages to go
1 parent 3420633 commit bd7ea1f

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+52
-52
lines changed

modules/auxiliary/gather/impersonate_ssl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ def initialize(info={})
2121
(self.signed) version using the information from the remote version. The module
2222
then Outputs (PEM|DER) format private key / certificate and a combined version
2323
for use in Apache or other Metasploit modules requiring SSLCert Inputs for private
24-
key / CA cert have been provided for those with diginator certs hanging about!
24+
key / CA cert have been provided for those with DigiNotar certs hanging about!
2525
}
2626
))
2727

modules/auxiliary/gather/kerberos_enumusers.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ def initialize(info = {})
1111
super(update_info(info,
1212
'Name' => 'Kerberos Domain User Enumeration',
1313
'Description' => %q(
14-
This module will enumerate valid Domain Users via Kerberos from an unauthenticated perspective. It utilises
14+
This module will enumerate valid Domain Users via Kerberos from an unauthenticated perspective. It utilizes
1515
the different responses returned by the service for valid and invalid users.
1616
),
1717
'Author' =>

modules/auxiliary/gather/shodan_search.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
'Name' => 'Shodan Search',
1616
'Description' => %q{
1717
This module uses the Shodan API to search Shodan. Accounts are free
18-
and an API key is required to used this module. Output from the module
18+
and an API key is required to use this module. Output from the module
1919
is displayed to the screen and can be saved to a file or the MSF database.
2020
NOTE: SHODAN filters (i.e. port, hostname, os, geo, city) can be used in
2121
queries, but there are limitations when used with a free API key. Please

modules/auxiliary/gather/windows_deployment_services_shares.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize(info = {})
2020
'Description' => %q{
2121
This module will search remote file shares for unattended installation files that may contain
2222
domain credentials. This is often used after discovering domain credentials with the
23-
auxilliary/scanner/dcerpc/windows_deployment_services module or in cases where you already
23+
auxiliary/scanner/dcerpc/windows_deployment_services module or in cases where you already
2424
have domain credentials. This module will connect to the RemInst share and any Microsoft
2525
Deployment Toolkit shares indicated by the share name comments.
2626
},

modules/auxiliary/gather/wp_w3_total_cache_hash_extract.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ def initialize
1313
'Name' => 'WordPress W3-Total-Cache Plugin 0.9.2.4 (or before) Username and Hash Extract',
1414
'Description' =>
1515
"The W3-Total-Cache Wordpress Plugin <= 0.9.2.4 can cache database statements
16-
and it's results in files for fast access. Version 0.9.2.4 has been fixed afterwards
16+
and its results in files for fast access. Version 0.9.2.4 has been fixed afterwards
1717
so it can be vulnerable. These cache files are in the webroot of the Wordpress
18-
installation and can be downloaded if the name is guessed. This modules tries to
18+
installation and can be downloaded if the name is guessed. This module tries to
1919
locate them with brute force in order to find usernames and password hashes in these
2020
files. W3 Total Cache must be configured with Database Cache enabled and Database
2121
Cache Method set to Disk to be vulnerable",

modules/auxiliary/pdf/foxit/authbypass.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ def initialize(info = {})
1212
super(update_info(info,
1313
'Name' => 'Foxit Reader Authorization Bypass',
1414
'Description' => %q{
15-
This module exploits a authorization bypass vulnerability in Foxit Reader
16-
build 1120. When a attacker creates a specially crafted pdf file containing
17-
a Open/Execute action, arbitrary commands can be executed without confirmation
15+
This module exploits an authorization bypass vulnerability in Foxit Reader
16+
build 1120. When an attacker creates a specially crafted pdf file containing
17+
an Open/Execute action, arbitrary commands can be executed without confirmation
1818
from the victim.
1919
},
2020
'License' => MSF_LICENSE,

modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ def initialize
1313
'Description' => %q{
1414
Send a spoofed router advertisement with high priority to force hosts to
1515
start the IPv6 address auto-config. Monitor for IPv6 host advertisements,
16-
and try to guess the link-local address by concatinating the prefix, and
16+
and try to guess the link-local address by concatenating the prefix, and
1717
the host portion of the IPv6 address. Use NDP host solicitation to
1818
determine if the IP address is valid'
1919
},

modules/auxiliary/scanner/dlsw/dlsw_leak_capture.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize
1616
'Description' => %q(
1717
This module implements the DLSw information disclosure retrieval. There
1818
is a bug in Cisco's DLSw implementation affecting 12.x and 15.x trains
19-
that allows an unuthenticated remote attacker to retrieve the partial
19+
that allows an unauthenticated remote attacker to retrieve the partial
2020
contents of packets traversing a Cisco router with DLSw configured
2121
and active.
2222
),

modules/auxiliary/scanner/dns/dns_amp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize
1414
'Name' => 'DNS Amplification Scanner',
1515
'Description' => %q{
1616
This module can be used to discover DNS servers which expose recursive
17-
name lookups which can be used in an amplication attack against a
17+
name lookups which can be used in an amplification attack against a
1818
third party.
1919
},
2020
'Author' => [ 'xistence <xistence[at]0x90.nl>'], # Original scanner module

modules/auxiliary/scanner/ftp/colorado_ftp_traversal.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
This module exploits a directory traversal vulnerability found in ColoradoFTP server
1616
version <= 1.3 Build 8. This vulnerability allows an attacker to download and upload arbitrary files
1717
from the server GET/PUT command including file system traversal strings starting with '\\\'.
18-
The server is writen in Java and therefore platform independant, however this vulnerability is only
18+
The server is written in Java and therefore platform independent, however this vulnerability is only
1919
exploitable on the Windows version.
2020
},
2121
'Platform' => 'win',

0 commit comments

Comments
 (0)