Skip to content

Commit

Permalink
fix spelling in scripts folder
Browse files Browse the repository at this point in the history
  • Loading branch information
h00die committed Jan 7, 2024
1 parent ee3b8b4 commit de53f45
Show file tree
Hide file tree
Showing 24 changed files with 37 additions and 37 deletions.
4 changes: 2 additions & 2 deletions scripts/meterpreter/event_manager.rb
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
"-c" => [ true, "Clear a given Event Log (or ALL if no argument specified)"],
"-f" => [ true, "Event ID to filter events on"],
"-s" => [ true, "Save logs to local CSV file, optionally specify alternate folder in which to save logs"],
"-p" => [ false, "Supress printing filtered logs to screen"]
"-p" => [ false, "Suppress printing filtered logs to screen"]
)


Expand Down Expand Up @@ -91,7 +91,7 @@ def get_log_details
# Function for Printing Event Log Details
#-------------------------------------------------------------------------------
def print_log_details
print_status("Retriving Event Log Configuration")
print_status("Retrieving Event Log Configuration")
tbl = Rex::Text::Table.new(
'Header' => "Event Logs on System",
'Indent' => 1,
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/file_collector.rb
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
def usage
print_line "Meterpreter Script for searching and downloading files that"
print_line "match a specific pattern. First save files to a file, edit and"
print_line("use that same file to download the choosen files.")
print_line("use that same file to download the chosen files.")
print_line(@opts.usage)
raise Rex::Script::Completed
end
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/gettelnet.rb
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
# Create the log directory
::FileUtils.mkdir_p(logs)

# Cleaup script file name
# Cleanup script file name
@dest = logs + "/clean_up_" + filenameinfo + ".rc"

@@exec_opts = Rex::Parser::Arguments.new(
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/hashdump.rb
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ def decrypt_user_keys(hbootkey, users)
lm_exists = user[:V][0x9c+4,4].unpack("V")[0] == 20 ? true : false
nt_exists = user[:V][0x9c+16,4].unpack("V")[0] == 20 ? true : false

#If we have a hashes, then parse them (Note: NT is dependant on LM)
#If we have a hashes, then parse them (Note: NT is dependent on LM)
hashlm_enc = user[:V][hoff + 4, 16] if lm_exists
hashnt_enc = user[:V][(hoff + (lm_exists ? 24 : 8)), 16] if nt_exists

Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/hostsedit.rb
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@


# Meterpreter script for modifying the hosts file in windows
# given a single entrie or several in a file and clear the
# given a single entry or several in a file and clear the
# DNS cache on the target machine.
# This script works with Windows 2000,Windows XP,Windows 2003,
# Windows Vista and Windows 2008.
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/keylogrecorder.rb
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
def usage
print_line("Keylogger Recorder Meterpreter Script")
print_line("This script will start the Meterpreter Keylogger and save all keys")
print_line("in a log file for later anlysis. To stop capture hit Ctrl-C")
print_line("in a log file for later analysis. To stop capture hit Ctrl-C")
print_line("Usage:" + @@exec_opts.usage)
raise Rex::Script::Completed
end
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/multi_console_command.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
#
# Meterpreter script for running multiple console commands on a meterpreter session
# Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
# Verion: 0.1
# Version: 0.1
#

################## Variable Declarations ##################
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/multi_meter_inject.rb
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
# Usage Message Function
#-------------------------------------------------------------------------------
def usage
print_line "Meterpreter script for injecting a reverce tcp Meterpreter payload"
print_line "Meterpreter script for injecting a reverse tcp Meterpreter payload"
print_line "in to memory of multiple PIDs. If none is provided, a notepad process"
print_line "will be created and a Meterpreter payload will be injected in to each."
print_line(@exec_opts.usage)
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/multicommand.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
#Meterpreter script for running multiple commands on Windows 2003, Windows Vista
# and Windows XP and Windows 2008 targets.
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
#Verion: 0.1
#Version: 0.1
################## Variable Declarations ##################
session = client
wininfo = client.sys.config.sysinfo
Expand All @@ -27,7 +27,7 @@
help = 0

################## Function Declarations ##################
# Function for running a list of commands stored in a array, returs string
# Function for running a list of commands stored in a array, returns string
def list_exec(session,cmdlst)
print_status("Running Command List ...")
tmpout = ""
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/multiscript.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

#Meterpreter script for running multiple scripts on a Meterpreter Session
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
#Verion: 0.2
#Version: 0.2
################## Variable Declarations ##################
session = client
# Setting Argument
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/netenum.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
#Meterpreter script for ping sweeps on Windows 2003, Windows Vista
#Windows 2008 and Windows XP targets using native windows commands.
#Provided by Carlos Perez at carlos_perez[at]darkoperator.com
#Verion: 0.1.2
#Version: 0.1.2
#Note:
################## Variable Declarations ##################
@@exec_opts = Rex::Parser::Arguments.new(
Expand Down Expand Up @@ -335,7 +335,7 @@ def message(dest)
elsif hostlist == nil
print_error("Please add a file with host list for DNS forward lookup: -hl <value>")
else
print_error("Something went wront")
print_error("Something went wrong")
end
elsif stdlkp == 1
if dom != nil
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/process_memdump.rb
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@
"-h" => [ false, "Help menu." ],
"-p" => [ true, "PID of process to dump."],
"-n" => [ true, "Name of process to dump."],
"-r" => [ true, "Text file wih list of process names to dump memory for, one per line."],
"-r" => [ true, "Text file with list of process names to dump memory for, one per line."],
"-t" => [ false, "toggle location information in dump."],
"-q" => [false, "Query the size of the Process that would be dump in bytes."]
)
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/remotewinenum.rb
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@
]
################## Function Declarations ##################

# Function for running a list of WMIC commands stored in a array, returs string
# Function for running a list of WMIC commands stored in a array, returns string
def wmicexec(session,wmic,user,pass,trgt)
print_status("Running WMIC Commands ....")
tmpout = ''
Expand Down Expand Up @@ -137,7 +137,7 @@ def headerbuid(session,target,dest)
# Function Help Message
def helpmsg
print("Remote Windows Enumeration Meterpreter Script\n" +
"This script will enumerate windows hosts in the target enviroment\n" +
"This script will enumerate windows hosts in the target environment\n" +
"given a username and password or using the credential under witch\n" +
"Meterpreter is running using WMI wmic windows native tool.\n" +
"Usage:\n" +
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/scheduleme.rb
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
"-l" => [ false,"When a user logs on."],
"-o" => [ true,"Options for executable when upload method used"],
"-s" => [ false,"At system startup."],
"-i" => [ false,"Run command imediatly and only once."],
"-i" => [ false,"Run command immediately and only once."],
"-r" => [ false,"Remote Schedule. Executable has to be already on remote target"],
"-u" => [ false,"Username of account with administrative privelages."],
"-p" => [ false,"Password for account provided."],
Expand Down
4 changes: 2 additions & 2 deletions scripts/meterpreter/schtasksabuse.rb
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
#by scheduling and running a list of command against one or more targets
#using schtasks command to run them as system. This script works with Windows XP,
#Windows 2003, Windows Vista and Windows 2008.
#Verion: 0.1.1
#Version: 0.1.1
#Note: in Vista UAC must be disabled to be able to perform scheduling
#and the meterpreter must be running under the profile of local admin
#or system.
Expand Down Expand Up @@ -47,7 +47,7 @@ def abuse(session,targets,commands,username,password,delay)
targets.each do |t|
next if t.strip.length < 1
next if t[0,1] == "#"
#for eacg command
#for each command
commands.each do |c|
next if c.strip.length < 1
next if c[0,1] == "#"
Expand Down
6 changes: 3 additions & 3 deletions scripts/meterpreter/screenspy.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

# Author:Roni Bachar (@roni_bachar) [email protected]
#
# Thie script will open an interactive view of remote hosts
# This script will open an interactive view of remote hosts
# You will need firefox installed on your machine


Expand Down Expand Up @@ -109,11 +109,11 @@ def wrong_meter_version(meter = meter_type)

if (localsys == "windows")

print_status("Runing in local mode => windows")
print_status("Running in local mode => windows")
print_status("Opening Interactive view...")
localcmd="start firefox -width 530 -height 660 \"file:///#{Msf::Config.install_root}/logs/screenshot/#{host}/video.html\""
else
print_status("Runing in local mode => Linux")
print_status("Running in local mode => Linux")
print_status("Opening Interactive view...")
localcmd="bash firefox -width 530 -height 660 \"file:///#{Msf::Config.install_root}/logs/screenshot/#{host}/video.html\""
end
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/service_manager.rb
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ def priv_check
if not is_uac_enabled? or is_admin?
return true
else
print_error("Insuficient Privileges")
print_error("Insufficient Privileges")
raise Rex::Script::Completed
end

Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/webcam.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
# Author: scriptjunkie
#
# Simplify running webcam, whether grabbing a single frame or running
# a continous loop.
# a continuous loop.

@client = client
opts = Rex::Parser::Arguments.new(
Expand Down
10 changes: 5 additions & 5 deletions scripts/meterpreter/winbf.rb
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@
################## Function Definition ##################
# Function for checking the password policy of current system.
# This policy may resemble the policy of other servers in the
#target enviroment.
#target environment.
def chkpolicy(session)
print_status("Checking password policy...")
output = []
Expand All @@ -54,11 +54,11 @@ def chkpolicy(session)
print_status "\tWARNING Lockout threshold configured, if #{lockout} attempts in #{failcount} minutes account will be locked"
print_status "\tThe account will be locked out for #{lcktime}"
end
# check for password lenght
# check for password length
if minpass.to_s == "0"
print_status "\tNo minimun password lenght is configured"
print_status "\tNo minimum password length is configured"
else
print_status "\tThe minumun password lengh configured is #{minpass}"
print_status "\tThe minimum password length configured is #{minpass}"
print_status "\tyour dictionary should start with passwords of #{minpass} length"
end
rescue ::Exception => e
Expand All @@ -70,7 +70,7 @@ def chkpolicy(session)
# Function for brute forcing passwords using windows native tools
def passbf(session,passlist,target,user,opt,logfile)
print_status("Running Brute force attack against #{user}")
print_status("Successfull Username and Password pairs are being saved in #{logfile}")
print_status("Successful Username and Password pairs are being saved in #{logfile}")
result = []
output = []
passfnd = 0
Expand Down
6 changes: 3 additions & 3 deletions scripts/meterpreter/winenum.rb
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@
'wbem\\wmic.exe',
'netsh.exe',
]
# Executables not pressent in Windows 2000
# Executables not present in Windows 2000
nowin2kexe = [
'netsh.exe',
'gpresult.exe',
Expand Down Expand Up @@ -186,7 +186,7 @@ def chkvm()
info = @client.sys.config.sysinfo
print_status "Checking if #{info['Computer']} is a Virtual Machine ........"

# Check for Target Machines if running in VM, only fo VMware Workstation/Fusion
# Check for Target Machines if running in VM, only for VMware Workstation/Fusion
begin
key = 'HKLM\\HARDWARE\\DESCRIPTION\\System\\BIOS'
root_key, base_key = @client.sys.registry.splitkey(key)
Expand Down Expand Up @@ -338,7 +338,7 @@ def gethash()
print_status("Hashes Dumped")
rescue ::Exception => e
print_status("\tError dumping hashes: #{e.class} #{e}")
print_status("\tPayload may be running with insuficient privileges!")
print_status("\tPayload may be running with insufficient privileges!")
end
flname = "#{@logfol}/hashdump.txt"
file_local_write(flname,hash)
Expand Down
2 changes: 1 addition & 1 deletion scripts/meterpreter/wmic.rb
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@
outfile = nil

################## Function Declarations ##################
# Function for running a list of WMIC commands stored in a array, returs string
# Function for running a list of WMIC commands stored in a array, returns string
def wmicexec(session,wmiccmds= nil)
tmpout = ''
session.response_timeout=120
Expand Down
2 changes: 1 addition & 1 deletion scripts/resource/auto_cred_checker.rc
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@

# This Metasploit RC-File could be used to automatically check already discovered
# credentials against some other login services.
# It uses allready discovered credential from the database and tries to use them against some
# It uses already discovered credential from the database and tries to use them against some
# other services

<ruby>
Expand Down
2 changes: 1 addition & 1 deletion scripts/resource/autocrawler.rc
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Author: m-1-k-3 (Web: http://www.s3cur1ty.de / Twitter: @s3cur1ty_de)

# This Metasploit RC-File could be used to crawl webapps automatically
# it uses the allready discovered webservers - "services -s http" / "services -s https"
# it uses the already discovered webservers - "services -s http" / "services -s https"
# you could use db_nmap or http_version for discovering the werbservers
# some basic jobhandling to not kill our own machine is included - check the maxjobs and threadspercrawler variables

Expand Down
2 changes: 1 addition & 1 deletion scripts/resource/basic_discovery.rc
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Author: m-1-k-3 (Web: http://www.s3cur1ty.de / Twitter: @s3cur1ty_de)

# This Metasploit RC-File could be used to portscan the network via nmap or via the internal portscanner module
# it also uses the udp_sweep module and some more metasploit modules for getting more infos ans vulns
# it also uses the udp_sweep module and some more metasploit modules for getting more infos and vulns
# RHOSTS is used from the global datastore
# VERBOSE is used from the global datastore
# you can define your own Nmap options via the global NMAPOPTS variable
Expand Down

0 comments on commit de53f45

Please sign in to comment.