Skip to content

Commit d56fffc

Browse files
committed
Land rapid7#8974, spelling/grammar fixes part 4. Finished.
2 parents 8853193 + f1be6b7 commit d56fffc

34 files changed

+39
-39
lines changed

modules/exploits/windows/scada/yokogawa_bkfsim_vhfd.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ def initialize(info = {})
1212
super(update_info(info,
1313
'Name' => 'Yokogawa CS3000 BKFSim_vhfd.exe Buffer Overflow',
1414
'Description' => %q{
15-
This module exploits an stack based buffer overflow on Yokogawa CS3000. The vulnerability
15+
This module exploits a stack based buffer overflow on Yokogawa CS3000. The vulnerability
1616
exists in the service BKFSim_vhfd.exe when using malicious user-controlled data to create
17-
logs using functions like vsprintf and memcpy in a insecure way. This module has been
17+
logs using functions like vsprintf and memcpy in an insecure way. This module has been
1818
tested successfully on Yokogawa Centum CS3000 R3.08.50 over Windows XP SP3.
1919
},
2020
'Author' =>

modules/exploits/windows/smb/generic_smb_dll_injection.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info={})
1414
'Name' => 'Generic DLL Injection From Shared Resource',
1515
'Description' => %q{
1616
This is a general-purpose module for exploiting conditions where a DLL can be loaded
17-
from an specified SMB share. This module serves payloads as DLLs over an SMB service.
17+
from a specified SMB share. This module serves payloads as DLLs over an SMB service.
1818
},
1919
'Author' =>
2020
[

modules/exploits/windows/smb/ms04_007_killbill.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,14 @@ def initialize(info = {})
2222
You are only allowed one attempt with this vulnerability. If
2323
the payload fails to execute, the LSASS system service will
2424
crash and the target system will automatically reboot itself
25-
in 60 seconds. If the payload succeeeds, the system will no
25+
in 60 seconds. If the payload succeeds, the system will no
2626
longer be able to process authentication requests, denying
2727
all attempts to login through SMB or at the console. A
2828
reboot is required to restore proper functioning of an
2929
exploited system.
3030
3131
This exploit has been successfully tested with the win32/*/reverse_tcp
32-
payloads, however a few problems were encounted when using the
32+
payloads, however a few problems were encountered when using the
3333
equivalent bind payloads. Your mileage may vary.
3434
3535
},

modules/exploits/windows/smb/ms06_070_wkssvc.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ def initialize(info = {})
1717
This module exploits a stack buffer overflow in the NetApi32 NetpManageIPCConnect
1818
function using the Workstation service in Windows 2000 SP4 and Windows XP SP2.
1919
20-
In order to exploit this vulnerability, you must specify a the name of a
20+
In order to exploit this vulnerability, you must specify the name of a
2121
valid Windows DOMAIN. It may be possible to satisfy this condition by using
22-
a custom dns and ldap setup, however that method is not covered here.
22+
a custom DNS and LDAP setup, however that method is not covered here.
2323
2424
Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator
2525
credentials are required to reach the vulnerable code. Windows XP SP1 only

modules/exploits/windows/smb/ms17_010_eternalblue.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ def initialize(info = {})
3030
and need a cool down period before the shells rain in again.
3131
3232
The module will attempt to use Anonymous login, by default, to authenticate to perform the
33-
exploit. If the user supplies credentials in the SMBUser,SMBPass, and SMBDomain options it will use
33+
exploit. If the user supplies credentials in the SMBUser, SMBPass, and SMBDomain options it will use
3434
those instead.
3535
3636
On some systems, this module may cause system instability and crashes, such as a BSOD or

modules/payloads/singles/cmd/mainframe/reverse_shell_jcl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ def initialize(info = {})
2222
super(merge_info(info,
2323
'Name' => 'Z/OS (MVS) Command Shell, Reverse TCP',
2424
'Description' => 'Provide JCL which creates a reverse shell
25-
This implmentation does not include ebcdic character translation,
25+
This implementation does not include ebcdic character translation,
2626
so a client with translation capabilities is required. MSF handles
2727
this automatically.',
2828
'Author' => 'Bigendian Smalls',

modules/payloads/singles/cmd/unix/reverse_ncat_ssl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module MetasploitModule
1717
def initialize(info = {})
1818
super(merge_info(info,
1919
'Name' => 'Unix Command Shell, Reverse TCP (via ncat)',
20-
'Description' => 'Creates an interactive shell via ncat, utilising ssl mode',
20+
'Description' => 'Creates an interactive shell via ncat, utilizing ssl mode',
2121
'Author' => 'C_Sto',
2222
'License' => MSF_LICENSE,
2323
'Platform' => 'unix',

modules/payloads/singles/firefox/exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info={})
1414
super(merge_info(info,
1515
'Name' => 'Firefox XPCOM Execute Command',
1616
'Description' => %Q|
17-
This module runs a shell command on the target OS withough touching the disk.
17+
This module runs a shell command on the target OS without touching the disk.
1818
On Windows, this command will flash the command prompt momentarily.
1919
This can be avoided by setting WSCRIPT to true, which drops a jscript
2020
"launcher" to disk that hides the prompt.

modules/payloads/singles/mainframe/shell_reverse_tcp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ def initialize(info = {})
2222
super(merge_info(info,
2323
'Name' => 'Z/OS (MVS) Command Shell, Reverse TCP Inline',
2424
'Description' => 'Listen for a connection and spawn a command shell.
25-
This implmentation does not include ebcdic character translation,
25+
This implementation does not include ebcdic character translation,
2626
so a client with translation capabilities is required. MSF handles
2727
this automatically.',
2828
'Author' => 'Bigendian Smalls',

modules/payloads/singles/windows/shell_hidden_bind_tcp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize(info = {})
2020
'Name' => 'Windows Command Shell, Hidden Bind TCP Inline',
2121
'Description' => 'Listen for a connection from certain IP and spawn a command shell.
2222
The shellcode will reply with a RST packet if the connections is not
23-
comming from the IP defined in AHOST. This way the port will appear
23+
coming from the IP defined in AHOST. This way the port will appear
2424
as "closed" helping us to hide the shellcode.',
2525
'Author' =>
2626
[

0 commit comments

Comments
 (0)