Skip to content

Commit dd7ab11

Browse files
David MaloneyDavid Maloney
authored andcommitted
Minor cleanup
1 parent 86f6d59 commit dd7ab11

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

lib/msf/core/exploit/winrm.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ def winrm_get_cmd_streams(response)
178178
rxml = REXML::Document.new(xml).root
179179
rxml.elements.to_a("//rsp:Stream").each do |node|
180180
next if node.text.nil?
181-
streams[node.attributes['Name']] << Rex::Text.base64_decode(node.text)
181+
streams[node.attributes['Name']] << Rex::Text.decode_base64(node.text)
182182
end
183183
return streams
184184
end

modules/auxiliary/scanner/winrm/winrm_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ def initialize
3030
works only if the remote end allows Negotiate(NTLM) authentication.
3131
Kerberos is not currently supported. Please note: in order to use this
3232
module without SSL, the 'AllowUnencrypted' winrm option must be set.
33-
Otherwise adjsut the port and set the SSL options in the module as appropriate.
33+
Otherwise adjust the port and set the SSL options in the module as appropriate.
3434
},
3535
'Author' => [ 'thelightcosine' ],
3636
'References' =>

modules/exploits/windows/winrm/winrm_powershell.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ def initialize(info = {})
2323
super(update_info(info,
2424
'Name' => 'WinRM Powershell Remote Code Execution',
2525
'Description' => %q{
26-
This module uses valid redentials to login to the WinRM service
26+
This module uses valid credentials to login to the WinRM service
2727
and execute a payload as a powershell script. It then attempts to
2828
automigrate before the WinRS shell dies.
2929

0 commit comments

Comments
 (0)