From 8beb6255cb5785961da541301f62bdfcf7acbb01 Mon Sep 17 00:00:00 2001 From: h00die Date: Sun, 7 Jan 2024 15:02:53 -0500 Subject: [PATCH] fix spelling in aux modules --- .../auxiliary/admin/aws/aws_launch_instances.rb | 6 +++--- modules/auxiliary/admin/backupexec/dump.rb | 2 +- .../citrix/citrix_netscaler_config_decrypt.rb | 6 +++--- .../http/arris_motorola_surfboard_backdoor_xss.rb | 2 +- .../admin/http/contentkeeper_fileaccess.rb | 2 +- .../admin/http/dlink_dir_645_password_extractor.rb | 2 +- .../admin/http/dlink_dsl320b_password_extractor.rb | 2 +- .../hikvision_unauth_pwd_reset_cve_2017_7921.rb | 2 +- .../admin/http/jboss_deploymentfilerepository.rb | 4 ++-- .../admin/http/manage_engine_dc_create_admin.rb | 2 +- .../netgear_r7000_backup_cgi_heap_overflow_rce.rb | 2 +- .../admin/http/pfadmin_set_protected_alias.rb | 6 +++--- .../auxiliary/admin/http/tomcat_utf8_traversal.rb | 2 +- .../admin/http/trendmicro_dlp_traversal.rb | 4 ++-- .../auxiliary/admin/http/typo3_news_module_sqli.rb | 4 ++-- modules/auxiliary/admin/http/typo3_sa_2009_001.rb | 2 +- .../admin/http/wp_symposium_sql_injection.rb | 2 +- .../auxiliary/admin/misc/sercomm_dump_config.rb | 14 +++++++------- .../admin/mssql/mssql_findandsampledata.rb | 8 ++++---- .../admin/mssql/mssql_ntlm_stealer_sqli.rb | 2 +- modules/auxiliary/admin/natpmp/natpmp_map.rb | 2 +- modules/auxiliary/admin/netbios/netbios_spoof.rb | 2 +- modules/auxiliary/admin/oracle/oraenum.rb | 2 +- .../auxiliary/admin/postgres/postgres_readfile.rb | 2 +- .../auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb | 2 +- modules/auxiliary/admin/scada/multi_cip_command.rb | 2 +- modules/auxiliary/admin/smb/psexec_ntdsgrab.rb | 4 ++-- modules/auxiliary/admin/tftp/tftp_transfer_util.rb | 4 ++-- modules/auxiliary/admin/tikiwiki/tikidblib.rb | 4 ++-- modules/auxiliary/admin/vnc/realvnc_41_bypass.rb | 4 ++-- modules/auxiliary/analyze/apply_pot.rb | 2 +- modules/auxiliary/bnat/bnat_router.rb | 2 +- modules/auxiliary/client/iec104/iec104.rb | 2 +- modules/auxiliary/client/telegram/send_message.rb | 2 +- .../auxiliary/dos/http/flexense_http_server_dos.rb | 2 +- modules/auxiliary/dos/http/ws_dos.rb | 2 +- modules/auxiliary/dos/scada/allen_bradley_pccc.rb | 4 ++-- modules/auxiliary/dos/ssl/openssl_aesni.rb | 2 +- .../dos/windows/ftp/iis75_ftpd_iac_bof.rb | 2 +- .../auxiliary/dos/windows/llmnr/ms11_030_dnsapi.rb | 2 +- .../auxiliary/dos/windows/smb/ms06_035_mailslot.rb | 2 +- .../dos/windows/smb/ms11_019_electbowser.rb | 2 +- .../dos/windows/smtp/ms06_019_exchange.rb | 8 ++++---- modules/auxiliary/fileformat/badpdf.rb | 2 +- modules/auxiliary/fuzzers/http/http_form_field.rb | 4 ++-- modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb | 6 +++--- .../adobe_coldfusion_fileread_cve_2023_26360.rb | 4 ++-- .../auxiliary/gather/android_stock_browser_uxss.rb | 2 +- .../gather/apple_safari_ftp_url_cookie_theft.rb | 2 +- modules/auxiliary/gather/asterisk_creds.rb | 2 +- modules/auxiliary/gather/cloud_lookup.rb | 4 ++-- .../auxiliary/gather/darkcomet_filedownloader.rb | 4 ++-- modules/auxiliary/gather/elasticsearch_enum.rb | 10 +++++----- .../gather/exchange_proxylogon_collector.rb | 8 ++++---- .../hikvision_info_disclosure_cve_2017_7921.rb | 2 +- .../gather/ibm_sametime_enumerate_users.rb | 6 +++--- .../auxiliary/gather/ibm_sametime_room_brute.rb | 2 +- modules/auxiliary/gather/impersonate_ssl.rb | 2 +- .../auxiliary/gather/konica_minolta_pwd_extract.rb | 10 +++++----- modules/auxiliary/gather/ldap_hashdump.rb | 2 +- modules/auxiliary/gather/ldap_query.rb | 2 +- .../auxiliary/gather/mikrotik_winbox_fileread.py | 2 +- modules/auxiliary/gather/nuuo_cms_bruteforce.rb | 2 +- modules/auxiliary/gather/redis_extractor.rb | 4 ++-- .../auxiliary/gather/safari_file_url_navigation.rb | 2 +- modules/auxiliary/gather/ssllabs_scan.rb | 2 +- modules/auxiliary/gather/suite_crm_export_sqli.rb | 2 +- .../gather/vbulletin_getindexablecontent_sqli.rb | 4 ++-- modules/auxiliary/gather/windows_secrets_dump.rb | 8 ++++---- .../auxiliary/gather/xerox_workcentre_5xxx_ldap.rb | 2 +- modules/auxiliary/scanner/afp/afp_login.rb | 2 +- .../scanner/dcerpc/windows_deployment_services.rb | 2 +- .../scanner/discovery/ipv6_multicast_ping.rb | 4 ++-- .../auxiliary/scanner/discovery/ipv6_neighbor.rb | 2 +- .../ipv6_neighbor_router_advertisement.rb | 2 +- .../auxiliary/scanner/ftp/bison_ftp_traversal.rb | 4 ++-- .../auxiliary/scanner/ftp/easy_file_sharing_ftp.rb | 4 ++-- .../auxiliary/scanner/ftp/konica_ftp_traversal.rb | 4 ++-- .../auxiliary/scanner/ftp/pcman_ftp_traversal.rb | 4 ++-- .../http/accellion_fta_statecode_file_read.rb | 2 +- modules/auxiliary/scanner/http/blind_sql_query.rb | 4 ++-- modules/auxiliary/scanner/http/brute_dirs.rb | 2 +- .../scanner/http/cassandra_web_file_read.rb | 2 +- .../scanner/http/cisco_nac_manager_traversal.rb | 2 +- .../scanner/http/cisco_ssl_vpn_priv_esc.rb | 2 +- .../auxiliary/scanner/http/clansphere_traversal.rb | 2 +- modules/auxiliary/scanner/http/copy_of_file.rb | 2 +- modules/auxiliary/scanner/http/crawler.rb | 2 +- .../scanner/http/dolibarr_16_contact_dump.rb | 2 +- .../auxiliary/scanner/http/exchange_proxylogon.rb | 2 +- modules/auxiliary/scanner/http/files_dir.rb | 2 +- modules/auxiliary/scanner/http/http_header.rb | 2 +- modules/auxiliary/scanner/http/http_login.rb | 2 +- modules/auxiliary/scanner/http/httpbl_lookup.rb | 2 +- modules/auxiliary/scanner/http/kodi_traversal.rb | 2 +- .../scanner/http/linksys_e1500_traversal.rb | 2 +- .../scanner/http/mod_negotiation_scanner.rb | 2 +- .../scanner/http/netdecision_traversal.rb | 2 +- .../scanner/http/netgear_sph200d_traversal.rb | 2 +- modules/auxiliary/scanner/http/novell_mdm_creds.rb | 2 +- modules/auxiliary/scanner/http/open_proxy.rb | 2 +- modules/auxiliary/scanner/http/owa_login.rb | 2 +- .../scanner/http/radware_appdirector_enum.rb | 2 +- modules/auxiliary/scanner/http/replace_ext.rb | 4 ++-- modules/auxiliary/scanner/http/robots_txt.rb | 2 +- modules/auxiliary/scanner/http/scraper.rb | 2 +- modules/auxiliary/scanner/http/sentry_cdu_enum.rb | 2 +- modules/auxiliary/scanner/http/sockso_traversal.rb | 2 +- .../support_center_plus_directory_traversal.rb | 4 ++-- modules/auxiliary/scanner/http/svn_scanner.rb | 2 +- .../scanner/http/tplink_traversal_noauth.rb | 2 +- modules/auxiliary/scanner/http/trace_axd.rb | 2 +- .../scanner/http/wangkongbao_traversal.rb | 2 +- modules/auxiliary/scanner/http/web_vulndb.rb | 2 +- .../scanner/http/wordpress_multicall_creds.rb | 2 +- .../scanner/http/wordpress_pingback_access.rb | 2 +- .../auxiliary/scanner/http/wordpress_scanner.rb | 2 +- modules/auxiliary/scanner/http/wp_easy_wp_smtp.rb | 2 +- .../auxiliary/scanner/http/wp_learnpress_sqli.rb | 2 +- .../http/zenworks_assetmanagement_getconfig.rb | 2 +- modules/auxiliary/scanner/ipmi/ipmi_version.rb | 2 +- .../auxiliary/scanner/memcached/memcached_amp.rb | 2 +- .../scanner/memcached/memcached_udp_version.rb | 2 +- modules/auxiliary/scanner/misc/oki_scanner.rb | 2 +- .../scanner/misc/sercomm_backdoor_scanner.rb | 4 ++-- .../scanner/msmail/shared/src/msmail/msmail.go | 2 +- .../scanner/msmq/cve_2023_21554_queuejumper.rb | 2 +- .../auxiliary/scanner/natpmp/natpmp_portscan.rb | 2 +- modules/auxiliary/scanner/ntp/ntp_monlist.rb | 2 +- .../scanner/postgres/postgres_schemadump.rb | 2 +- modules/auxiliary/scanner/redis/file_upload.rb | 4 ++-- modules/auxiliary/scanner/rsync/modules_list.rb | 2 +- modules/auxiliary/scanner/sap/sap_icm_urlscan.rb | 2 +- .../scanner/scada/modbus_banner_grabbing.rb | 2 +- .../auxiliary/scanner/scada/modbus_findunitid.rb | 2 +- modules/auxiliary/scanner/scada/modbusclient.rb | 2 +- .../auxiliary/scanner/smb/psexec_loggedin_users.rb | 6 +++--- modules/auxiliary/scanner/ssh/ssh_enum_git_keys.rb | 2 +- .../auxiliary/scanner/ssl/openssl_heartbleed.rb | 2 +- modules/auxiliary/scanner/ssl/ssl_version.rb | 8 ++++---- .../auxiliary/scanner/vmware/vmware_enum_vms.rb | 2 +- modules/auxiliary/server/browser_autopwn.rb | 4 ++-- modules/auxiliary/server/capture/http_ntlm.rb | 2 +- modules/auxiliary/server/capture/mssql.rb | 2 +- modules/auxiliary/server/capture/smtp.rb | 2 +- modules/auxiliary/server/http_ntlmrelay.rb | 4 ++-- modules/auxiliary/server/icmp_exfil.rb | 6 +++--- modules/auxiliary/server/local_hwbridge.rb | 6 +++--- modules/auxiliary/server/netbios_spoof_nat.rb | 2 +- modules/auxiliary/spoof/arp/arp_poisoning.rb | 8 ++++---- modules/auxiliary/spoof/nbns/nbns_response.rb | 2 +- .../sqli/dlink/dlink_central_wifimanager_sqli.rb | 2 +- modules/auxiliary/voip/sip_invite_spoof.rb | 2 +- 153 files changed, 227 insertions(+), 227 deletions(-) diff --git a/modules/auxiliary/admin/aws/aws_launch_instances.rb b/modules/auxiliary/admin/aws/aws_launch_instances.rb index b6d2126c18fc..4d2cac968050 100644 --- a/modules/auxiliary/admin/aws/aws_launch_instances.rb +++ b/modules/auxiliary/admin/aws/aws_launch_instances.rb @@ -85,7 +85,7 @@ def run begin # need a better parser so we can avoid shit like this ip = doc['reservationSet']['item']['instancesSet']['item']['networkInterfaceSet']['item']['privateIpAddressesSet']['item']['association']['publicIp'] - print_status("Instance #{instance_id} has IP adrress #{ip}") + print_status("Instance #{instance_id} has IP address #{ip}") rescue NoMethodError print_error("Could not retrieve instance IP address") end @@ -150,7 +150,7 @@ def create_keypair(creds) if doc['Response'].nil? doc = print_results(doc, action) if doc['keyName'].nil? || doc['keyFingerprint'].nil? - print_error("Error creating key using privided key material (SSH_PUB_KEY)") + print_error("Error creating key using provided key material (SSH_PUB_KEY)") else print_status("Created #{doc['keyName']} (#{doc['keyFingerprint']})") end @@ -158,7 +158,7 @@ def create_keypair(creds) if doc['Response']['Errors'] && doc['Response']['Errors']['Error'] print_error(doc['Response']['Errors']['Error']['Message']) else - print_error("Error creating key using privided key material (SSH_PUB_KEY)") + print_error("Error creating key using provided key material (SSH_PUB_KEY)") end end end diff --git a/modules/auxiliary/admin/backupexec/dump.rb b/modules/auxiliary/admin/backupexec/dump.rb index f2871c5a4c3f..0b3dc5bb3751 100644 --- a/modules/auxiliary/admin/backupexec/dump.rb +++ b/modules/auxiliary/admin/backupexec/dump.rb @@ -174,7 +174,7 @@ def run end # - # Define our tranfer parameters + # Define our transfer parameters # xenv = [ diff --git a/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb b/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb index d80d81e60ea3..c4f3eec272d2 100644 --- a/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb +++ b/modules/auxiliary/admin/citrix/citrix_netscaler_config_decrypt.rb @@ -110,11 +110,11 @@ def build_ns_kek f1_hex = File.binread(ns_kek_f1) f2_hex = File.binread(ns_kek_f2) unless f1_hex.match?(/^[0-9a-f]+$/i) - print_error('Provided F1.key is not valid hexidecimal data') + print_error('Provided F1.key is not valid hexadecimal data') raise Msf::OptionValidateError, ['NS_KEK_F1'] end unless f2_hex.match?(/^[0-9a-f]+$/i) - print_error('Provided F2.key is not valid hexidecimal data') + print_error('Provided F2.key is not valid hexadecimal data') raise Msf::OptionValidateError, ['NS_KEK_F2'] end f1_key = f1_hex[66..130].scan(/../).map(&:hex).pack('C*') @@ -152,7 +152,7 @@ def parse_ns_config end print_status("Config line:\n#{config_entry}") if is_kek && !@ns_kek_key - print_warning('Entry was encrypted with KEK but no KEK fragement files provided, decryption will not be possible') + print_warning('Entry was encrypted with KEK but no KEK fragment files provided, decryption will not be possible') next end username = parse_username_from_config(config_entry) diff --git a/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb b/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb index be525bd0fb47..464cea46bdcf 100644 --- a/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb +++ b/modules/auxiliary/admin/http/arris_motorola_surfboard_backdoor_xss.rb @@ -43,7 +43,7 @@ def initialize(info = {}) 'References' => [ [ 'CVE', '2015-0964' ], # XSS vulnerability [ 'CVE', '2015-0965' ], # CSRF vulnerability - [ 'CVE', '2015-0966' ], # "techician/yZgO8Bvj" web interface backdoor + [ 'CVE', '2015-0966' ], # "technician/yZgO8Bvj" web interface backdoor [ 'URL', 'https://www.rapid7.com/blog/post/2015/06/05/r7-2015-01-csrf-backdoor-and-persistent-xss-on-arris-motorola-cable-modems/' ], ] ) diff --git a/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb b/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb index ee82e2b9d04c..11b99db90e3f 100644 --- a/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb +++ b/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb @@ -31,7 +31,7 @@ def initialize end def run_host(_ip) - tmpfile = Rex::Text.rand_text_alphanumeric(20) # Store the base64 encoded traveral data in a hard-to-brute filename, just in case. + tmpfile = Rex::Text.rand_text_alphanumeric(20) # Store the base64 encoded traversal data in a hard-to-brute filename, just in case. print_status("Attempting to connect to #{rhost}:#{rport}") res = send_request_raw( diff --git a/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb b/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb index 2f547f53a47d..c50d2f7062ba 100644 --- a/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb +++ b/modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb @@ -52,7 +52,7 @@ def run if res.body =~ %r{(.*)} print_good("#{rhost}:#{rport} - credentials successfully extracted") - # store all details as loot -> there is some usefull stuff in the response + # store all details as loot -> there is some useful stuff in the response loot = store_loot('dlink.dir645.config', 'text/plain', rhost, res.body) print_good("#{rhost}:#{rport} - Account details downloaded to: #{loot}") diff --git a/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb b/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb index d8a31f8ac522..fa3700c3de68 100644 --- a/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb +++ b/modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb @@ -48,7 +48,7 @@ def run print_good("#{rhost}:#{rport} - Credentials successfully extracted") end - # store all details as loot -> there is some usefull stuff in the response + # store all details as loot -> there is some useful stuff in the response loot = store_loot('dlink.dsl320b.config', 'text/plain', rhost, res.body) print_good("#{rhost}:#{rport} - Configuration of DSL 320B downloaded to: #{loot}") diff --git a/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb b/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb index cec26d10c7ca..a0f8a9541656 100644 --- a/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb +++ b/modules/auxiliary/admin/http/hikvision_unauth_pwd_reset_cve_2017_7921.rb @@ -108,7 +108,7 @@ def check end if res.nil? - return Exploit::CheckCode::Unknown('No response recieved from the target!') + return Exploit::CheckCode::Unknown('No response received from the target!') elsif res && res.code == 200 xml_res = res.get_xml_document print_status('Following users are available for password reset...') diff --git a/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb b/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb index 17d2c6372ebe..41bf4235e587 100644 --- a/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb +++ b/modules/auxiliary/admin/http/jboss_deploymentfilerepository.rb @@ -55,7 +55,7 @@ def deploy_action(app_base, war_data) head_stager_uri = '/' + stager_base + '/' + head_stager_jsp_name + '.jsp' res = upload_file(stager_base, head_stager_jsp_name, head_stager_contents) - # We split the stager_jsp_code in multipe junks and transfer on the + # We split the stager_jsp_code in multiple junks and transfer on the # target with multiple requests current_pos = 0 while current_pos < stager_contents.length @@ -68,7 +68,7 @@ def deploy_action(app_base, war_data) end end - # Using HEAD may trigger a 500 Internal Server Error (at leat on 4.2.3.GA), + # Using HEAD may trigger a 500 Internal Server Error (at least on 4.2.3.GA), # but the file still gets written. unless res && (res.code == 200 || res.code == 500) fail_with(Failure::Unknown, 'Failed to deploy') diff --git a/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb b/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb index 6efa947c4755..d1e71a94bca5 100644 --- a/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb +++ b/modules/auxiliary/admin/http/manage_engine_dc_create_admin.rb @@ -62,7 +62,7 @@ def run } }) - # Yes, "sucess" is really mispelt, as is "Servelet" ... ! + # Yes, "success" is really misspelt, as is "Servelet" ... ! unless res && res.code == 200 && res.body && res.body.to_s =~ /sucess/ print_error('Administrator account creation failed') end diff --git a/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb b/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb index f10ee933a883..dc8023b4664c 100644 --- a/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb +++ b/modules/auxiliary/admin/http/netgear_r7000_backup_cgi_heap_overflow_rce.rb @@ -27,7 +27,7 @@ def initialize(info = {}) 'Platform' => 'linux', 'Author' => [ 'colorlight2019', # Vulnerability Discovery and Exploit Code - 'SSD Disclosure', # Vulnerabilty Writeup + 'SSD Disclosure', # Vulnerability Writeup 'Grant Willcox (tekwizz123)' # Metasploit Module ], 'DefaultTarget' => 0, diff --git a/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb b/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb index ac4c37585186..6ab977cf06df 100644 --- a/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb +++ b/modules/auxiliary/admin/http/pfadmin_set_protected_alias.rb @@ -108,9 +108,9 @@ def run if res.nil? || res.body.nil? fail_with(Failure::UnexpectedReply, 'Unexpected reply while deleting the alias') elsif res.body =~ %r{}mi - fail_with(Failure::NotVulnerable, 'It seems the target is not vulerable, the deletion of the target alias failed.') + fail_with(Failure::NotVulnerable, 'It seems the target is not vulnerable, the deletion of the target alias failed.') else - fail_with(Failure::Unknown, 'An unexpected failure occured.') + fail_with(Failure::Unknown, 'An unexpected failure occurred.') end end print_good('Deleted the old alias') @@ -130,7 +130,7 @@ def run elsif res.body =~ /