@@ -446,7 +446,7 @@ def start_exploit_modules()
446
446
end
447
447
448
448
# Now that we've got all of our exploit tests put together,
449
- # organize them into an all tests (JS and no-JS), organized by rank,
449
+ # organize them into an all tests (JS and no-JS), organized by rank,
450
450
# and doesnt-require-scripting (no-JS), organized by browser name.
451
451
if apo [ :javascript ] && apo [ :ua_name ]
452
452
@all_tests [ apo [ :rank ] ] ||= [ ]
@@ -507,7 +507,7 @@ def start_exploit_modules()
507
507
# Sort the tests by reliability, descending.
508
508
# I don't like doing this directly (wihout a !), but any other sort wasn't sticking - NE
509
509
@all_tests = @all_tests . sort . reverse
510
-
510
+
511
511
# This matters a lot less for noscript exploits since they basically
512
512
# get thrown into a big pile of iframes that the browser will load
513
513
# semi-concurrently. Still, might as well.
@@ -748,12 +748,12 @@ def build_script_response(cli, request)
748
748
# if we have no client_info, this will add all tests. Otherwise tries
749
749
# to only send tests for exploits that target the client's detected
750
750
# browser.
751
-
751
+
752
752
@all_tests . each { |rank , sploits |
753
753
sploits . each { |s |
754
754
browser = s [ :ua_name ] || "generic"
755
755
next unless client_matches_browser ( client_info , browser )
756
-
756
+
757
757
# Send all the generics regardless of what the client is. If the
758
758
# client is nil, then we don't know what it really is, so just err
759
759
# on the side of shells and send everything. Otherwise, send only
@@ -769,7 +769,7 @@ def build_script_response(cli, request)
769
769
end
770
770
# shouldn't be any in the resource, but just in case...
771
771
res = exploit_resource ( s [ :name ] ) . gsub ( "\n " , '' ) . gsub ( "'" , "\\ \\ '" )
772
-
772
+
773
773
# Skip exploits that don't match the client's OS.
774
774
if ( host_info and host_info [ :os_name ] and s [ :os_name ] )
775
775
# Reject exploits whose OS doesn't match that of the
0 commit comments