diff --git a/modules/auxiliary/admin/aws/aws_launch_instances.rb b/modules/auxiliary/admin/aws/aws_launch_instances.rb index b6d2126c18fc..4d2cac968050 100644 --- a/modules/auxiliary/admin/aws/aws_launch_instances.rb +++ b/modules/auxiliary/admin/aws/aws_launch_instances.rb @@ -85,7 +85,7 @@ def run begin # need a better parser so we can avoid shit like this ip = doc['reservationSet']['item']['instancesSet']['item']['networkInterfaceSet']['item']['privateIpAddressesSet']['item']['association']['publicIp'] - print_status("Instance #{instance_id} has IP adrress #{ip}") + print_status("Instance #{instance_id} has IP address #{ip}") rescue NoMethodError print_error("Could not retrieve instance IP address") end @@ -150,7 +150,7 @@ def create_keypair(creds) if doc['Response'].nil? doc = print_results(doc, action) if doc['keyName'].nil? || doc['keyFingerprint'].nil? - print_error("Error creating key using privided key material (SSH_PUB_KEY)") + print_error("Error creating key using provided key material (SSH_PUB_KEY)") else print_status("Created #{doc['keyName']} (#{doc['keyFingerprint']})") end @@ -158,7 +158,7 @@ def create_keypair(creds) if doc['Response']['Errors'] && doc['Response']['Errors']['Error'] print_error(doc['Response']['Errors']['Error']['Message']) else - print_error("Error creating key using privided key material (SSH_PUB_KEY)") + print_error("Error creating key using provided key material (SSH_PUB_KEY)") end end end diff --git a/modules/auxiliary/admin/backupexec/dump.rb b/modules/auxiliary/admin/backupexec/dump.rb index f2871c5a4c3f..0b3dc5bb3751 100644 --- a/modules/auxiliary/admin/backupexec/dump.rb +++ b/modules/auxiliary/admin/backupexec/dump.rb @@ -174,7 +174,7 @@ def run end # - # Define our tranfer parameters + # Define our transfer parameters # xenv = [ diff --git a/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb b/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb index d80d81e60ea3..c4f3eec272d2 100644 --- a/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb +++ b/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb @@ -110,11 +110,11 @@ def build_ns_kek f1_hex = File.binread(ns_kek_f1) f2_hex = File.binread(ns_kek_f2) unless f1_hex.match?(/^[0-9a-f]+$/i) - print_error('Provided F1.key is not valid hexidecimal data') + print_error('Provided F1.key is not valid hexadecimal data') raise Msf::OptionValidateError, ['NS_KEK_F1'] end unless f2_hex.match?(/^[0-9a-f]+$/i) - print_error('Provided F2.key is not valid hexidecimal data') + print_error('Provided F2.key is not valid hexadecimal data') raise Msf::OptionValidateError, ['NS_KEK_F2'] end f1_key = f1_hex[66..130].scan(/../).map(&:hex).pack('C*') @@ -152,7 +152,7 @@ def parse_ns_config end print_status("Config line:\n#{config_entry}") if is_kek && !@ns_kek_key - print_warning('Entry was encrypted with KEK but no KEK fragement files provided, decryption will not be possible') + print_warning('Entry was encrypted with KEK but no KEK fragment files provided, decryption will not be possible') next end username = parse_username_from_config(config_entry) diff --git a/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb b/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb index be525bd0fb47..464cea46bdcf 100644 --- a/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb +++ b/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb @@ -43,7 +43,7 @@ def initialize(info = {}) 'References' => [ [ 'CVE', '2015-0964' ], # XSS vulnerability [ 'CVE', '2015-0965' ], # CSRF vulnerability - [ 'CVE', '2015-0966' ], # "techician/yZgO8Bvj" web interface backdoor + [ 'CVE', '2015-0966' ], # "technician/yZgO8Bvj" web interface backdoor [ 'URL', 'https://www.rapid7.com/blog/post/2015/06/05/r7-2015-01-csrf-backdoor-and-persistent-xss-on-arris-motorola-cable-modems/' ], ] ) diff --git a/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb b/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb index ee82e2b9d04c..11b99db90e3f 100644 --- a/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb +++ b/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb @@ -31,7 +31,7 @@ def initialize end def run_host(_ip) - tmpfile = Rex::Text.rand_text_alphanumeric(20) # Store the base64 encoded traveral data in a hard-to-brute filename, just in case. + tmpfile = Rex::Text.rand_text_alphanumeric(20) # Store the base64 encoded traversal data in a hard-to-brute filename, just in case. print_status("Attempting to connect to #{rhost}:#{rport}") res = send_request_raw( diff --git a/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb b/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb index 2f547f53a47d..c50d2f7062ba 100644 --- a/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb +++ b/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb @@ -52,7 +52,7 @@ def run if res.body =~ %r{(.*)} print_good("#{rhost}:#{rport} - credentials successfully extracted") - # store all details as loot -> there is some usefull stuff in the response + # store all details as loot -> there is some useful stuff in the response loot = store_loot('dlink.dir645.config', 'text/plain', rhost, res.body) print_good("#{rhost}:#{rport} - Account details downloaded to: #{loot}") diff --git a/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb b/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb index d8a31f8ac522..fa3700c3de68 100644 --- a/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb +++ b/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb @@ -48,7 +48,7 @@ def run print_good("#{rhost}:#{rport} - Credentials successfully extracted") end - # store all details as loot -> there is some usefull stuff in the response + # store all details as loot -> there is some useful stuff in the response loot = store_loot('dlink.dsl320b.config', 'text/plain', rhost, res.body) print_good("#{rhost}:#{rport} - Configuration of DSL 320B downloaded to: #{loot}") diff --git a/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb b/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb index cec26d10c7ca..a0f8a9541656 100644 --- a/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb +++ b/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb @@ -108,7 +108,7 @@ def check end if res.nil? - return Exploit::CheckCode::Unknown('No response recieved from the target!') + return Exploit::CheckCode::Unknown('No response received from the target!') elsif res && res.code == 200 xml_res = res.get_xml_document print_status('Following users are available for password reset...') diff --git a/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb b/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb index 17d2c6372ebe..41bf4235e587 100644 --- a/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb +++ b/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb @@ -55,7 +55,7 @@ def deploy_action(app_base, war_data) head_stager_uri = '/' + stager_base + '/' + head_stager_jsp_name + '.jsp' res = upload_file(stager_base, head_stager_jsp_name, head_stager_contents) - # We split the stager_jsp_code in multipe junks and transfer on the + # We split the stager_jsp_code in multiple junks and transfer on the # target with multiple requests current_pos = 0 while current_pos < stager_contents.length @@ -68,7 +68,7 @@ def deploy_action(app_base, war_data) end end - # Using HEAD may trigger a 500 Internal Server Error (at leat on 4.2.3.GA), + # Using HEAD may trigger a 500 Internal Server Error (at least on 4.2.3.GA), # but the file still gets written. unless res && (res.code == 200 || res.code == 500) fail_with(Failure::Unknown, 'Failed to deploy') diff --git a/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb b/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb index 6efa947c4755..d1e71a94bca5 100644 --- a/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb +++ b/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb @@ -62,7 +62,7 @@ def run } }) - # Yes, "sucess" is really mispelt, as is "Servelet" ... ! + # Yes, "success" is really misspelt, as is "Servelet" ... ! unless res && res.code == 200 && res.body && res.body.to_s =~ /sucess/ print_error('Administrator account creation failed') end diff --git a/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb b/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb index f10ee933a883..dc8023b4664c 100644 --- a/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb +++ b/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb @@ -27,7 +27,7 @@ def initialize(info = {}) 'Platform' => 'linux', 'Author' => [ 'colorlight2019', # Vulnerability Discovery and Exploit Code - 'SSD Disclosure', # Vulnerabilty Writeup + 'SSD Disclosure', # Vulnerability Writeup 'Grant Willcox (tekwizz123)' # Metasploit Module ], 'DefaultTarget' => 0, diff --git a/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb b/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb index ac4c37585186..6ab977cf06df 100644 --- a/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb +++ b/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb @@ -108,9 +108,9 @@ def run if res.nil? || res.body.nil? fail_with(Failure::UnexpectedReply, 'Unexpected reply while deleting the alias') elsif res.body =~ %r{}mi - fail_with(Failure::NotVulnerable, 'It seems the target is not vulerable, the deletion of the target alias failed.') + fail_with(Failure::NotVulnerable, 'It seems the target is not vulnerable, the deletion of the target alias failed.') else - fail_with(Failure::Unknown, 'An unexpected failure occured.') + fail_with(Failure::Unknown, 'An unexpected failure occurred.') end end print_good('Deleted the old alias') @@ -130,7 +130,7 @@ def run elsif res.body =~ /