Skip to content

Commit aa2a843

Browse files
authored
Land rapid7#18399, fix multiple spelling mistakes
2 parents 9c02331 + d64ed33 commit aa2a843

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+134
-134
lines changed

lib/msf/base/logging.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ def self.start_session_log(session)
9494
# Stops logging for a given session.
9595
#
9696
# @param session [Msf::Session] the session to stop logging.
97-
# @return [Boolean] true if sucessful. false if not.
97+
# @return [Boolean] true if successful. false if not.
9898
def self.stop_session_log(session)
9999
rlog("\n[*] Logging stopped: #{Time.now}\n\n", session.log_source)
100100

lib/msf/base/sessions/command_shell.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -410,7 +410,7 @@ def cmd_download_help
410410

411411
def cmd_download(*args)
412412
if args.length != 2
413-
# no argumnets, just print help message
413+
# no arguments, just print help message
414414
return cmd_download_help
415415
end
416416

@@ -445,7 +445,7 @@ def cmd_upload_help
445445

446446
def cmd_upload(*args)
447447
if args.length != 2
448-
# no argumnets, just print help message
448+
# no arguments, just print help message
449449
return cmd_upload_help
450450
end
451451

@@ -464,9 +464,9 @@ def cmd_upload(*args)
464464
content = File.binread(src)
465465
result = _file_transfer.write_file(dst, content)
466466
print_good("File <#{dst}> upload finished") if result
467-
print_error("Error occured while uploading <#{src}> to <#{dst}>") unless result
467+
print_error("Error occurred while uploading <#{src}> to <#{dst}>") unless result
468468
rescue => e
469-
print_error("Error occured while uploading <#{src}> to <#{dst}> - #{e.message}")
469+
print_error("Error occurred while uploading <#{src}> to <#{dst}> - #{e.message}")
470470
elog(e)
471471
return
472472
end

lib/msf/core/analyze/result.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ def matches_host_os?
205205
# Special cases
206206
if set.include?('unix')
207207
# Skip archaic old HPUX bugs if we have a solid match against another OS
208-
return false if set.include?("hpux") && mod.refname.include?("hpux") && !hos.inlcude?("hpux")
208+
return false if set.include?("hpux") && mod.refname.include?("hpux") && !hos.include?("hpux")
209209
# Skip AIX bugs if we have a solid match against another OS
210210
return false if set.include?("aix") && mod.refname.include?("aix") && !hos.include?("aix")
211211
# Skip IRIX bugs if we have a solid match against another OS

lib/msf/core/auxiliary/fuzzer.rb

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ def fuzz_numbers
3434
end
3535

3636

37-
# Will return or yield a string based on the presense of a block
37+
# Will return or yield a string based on the presence of a block
3838
#
3939
# @return [Array] Returns and array of arrays of strings if there is no block given
4040
# @yield [Array] Yields array of strings if there is a block given
@@ -147,7 +147,7 @@ def fuzzer_number_power2_plus
147147
block_given? ? res.each { |n| yield(n) } : res
148148
end
149149

150-
# Generates a fuzz string If no block is set, it will retrive characters from the
150+
# Generates a fuzz string If no block is set, it will retrieve characters from the
151151
# FuzzChar datastore option.
152152
#
153153
# @param len [Integer] String size.
@@ -240,7 +240,7 @@ def fuzzer_string_path_prefixes
240240

241241
# Generates various small URI string types
242242
#
243-
# @return [Array] Returns an array of stings
243+
# @return [Array] Returns an array of strings
244244

245245
def fuzzer_string_uris_small
246246
res = []
@@ -257,7 +257,7 @@ def fuzzer_string_uris_small
257257

258258
# Generates various long URI string types
259259
#
260-
# @return [Array] Returns an array of stings
260+
# @return [Array] Returns an array of strings
261261

262262
def fuzzer_string_uris_long
263263
res = []
@@ -274,7 +274,7 @@ def fuzzer_string_uris_long
274274

275275
# Generates various giant URI string types
276276
#
277-
# @return [Array] Returns an array of stings
277+
# @return [Array] Returns an array of strings
278278

279279
def fuzzer_string_uris_giant
280280
res = []
@@ -291,7 +291,7 @@ def fuzzer_string_uris_giant
291291

292292
# Format for the URI string generator
293293
#
294-
# @return [Array] Returns an array of stings
294+
# @return [Array] Returns an array of strings
295295

296296
def fuzzer_string_uris_format
297297
res = []
@@ -309,7 +309,7 @@ def fuzzer_string_uris_format
309309

310310
# Generates various small strings
311311
#
312-
# @return [Array] Returns an array of stings
312+
# @return [Array] Returns an array of strings
313313

314314
def fuzzer_string_uris_dos
315315
res = []
@@ -327,7 +327,7 @@ def fuzzer_string_uris_dos
327327

328328
# Generates various small strings
329329
#
330-
# @return [Array] Returns an array of stings
330+
# @return [Array] Returns an array of strings
331331

332332
def fuzzer_string_paths_small
333333
res = []
@@ -343,7 +343,7 @@ def fuzzer_string_paths_small
343343

344344
# Generates various small strings
345345
#
346-
# @return [Array] Returns an array of stings
346+
# @return [Array] Returns an array of strings
347347

348348
def fuzzer_string_paths_long
349349
res = []
@@ -359,7 +359,7 @@ def fuzzer_string_paths_long
359359

360360
# Generates various giant strings
361361
#
362-
# @return [Array] Returns an array of stings
362+
# @return [Array] Returns an array of strings
363363

364364
def fuzzer_string_paths_giant
365365
res = []
@@ -375,7 +375,7 @@ def fuzzer_string_paths_giant
375375

376376
# Format for the path generator
377377
#
378-
# @return [Array] Returns an array of stings
378+
# @return [Array] Returns an array of strings
379379

380380
def fuzzer_string_paths_format
381381
res = []
@@ -391,7 +391,7 @@ def fuzzer_string_paths_format
391391

392392
# Generates fuzzer strings using path prefixes
393393
#
394-
# @return [Array] Returns an array of stings
394+
# @return [Array] Returns an array of strings
395395

396396
def fuzzer_string_paths_dos
397397
res = []

lib/msf/core/auxiliary/nfs.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ def can_mount?(locations, mountable = true, hostname = '', lhost = '')
3636
location = "#{Regexp.last_match(1)}#{Rex::Socket.addr_atoc(Regexp.last_match(2))}"
3737
end
3838
return true if Rex::Socket::RangeWalker.new(location).include?(lhost)
39-
# at this point we assume its a hostname, so we use Ruby's File fnmatch so that it proceses the wildcards
39+
# at this point we assume its a hostname, so we use Ruby's File fnmatch so that it processes the wildcards
4040
# as its a quick and easy way to use glob matching for wildcards and get a boolean response
4141
return true if File.fnmatch(location, hostname)
4242
end

lib/msf/core/auxiliary/prometheus.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ def prometheus_config_eater(yamlconf)
446446
dns_sd_configs['basic_auth']['password_file'] = scrape.dig('basic_auth', 'password_file') if scrape.dig('basic_auth', 'password_file')
447447
end
448448

449-
# pass in the 'scheme' from a level above to propely build the URI
449+
# pass in the 'scheme' from a level above to properly build the URI
450450
if dns_sd_configs['scheme'].nil? && scrape['scheme']
451451
dns_sd_configs['scheme'] = scrape['scheme']
452452
end

lib/msf/core/auxiliary/report.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -454,7 +454,7 @@ def store_loot(ltype, ctype, host, data, filename=nil, info=nil, service=nil, &b
454454
end
455455

456456
#
457-
# Store some locally-generated data as a file, similiar to store_loot.
457+
# Store some locally-generated data as a file, similar to store_loot.
458458
# Sometimes useful for keeping artifacts of an exploit or auxiliary
459459
# module, such as files from fileformat exploits. (TODO: actually
460460
# implement this on file format modules.)

lib/msf/core/auxiliary/rocketmq.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ def parse_rocketmq_data(res)
6666
# remove a response header so we have json-ish data
6767
res = res[8..]
6868

69-
# we have 2 json objects appended to eachother, so we now need to split that out and make it usable
69+
# we have 2 json objects appended to each other, so we now need to split that out and make it usable
7070
res = res.split('}{')
7171

7272
jsonable = []

lib/msf/core/auxiliary/vyos.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ def vyos_config_eater(thost, tport, config, store = true)
7878
# in >= 1.3 'level' is no longer included and defaults to admin.
7979

8080
r = 'user ([^ ]+) {\s*authentication {\s*'
81-
r << 'encrypted-password (\$?[\w$\./\*]*)\s*' # leading $ is optional incase the password is all stars
81+
r << 'encrypted-password (\$?[\w$\./\*]*)\s*' # leading $ is optional in case the password is all stars
8282
r << '(?:plaintext-password "([^"]*)")?\s*' # optional
8383
r << '}'
8484
r << '(?:\s*full-name "([^"]*)")?\s*' # optional

lib/msf/core/auxiliary/web/form.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ def inputs=( i )
8181
end
8282

8383
#
84-
# Hash of params to be submited (derived by #inputs)
84+
# Hash of params to be submitted (derived by #inputs)
8585
#
8686
# Examples
8787
#
@@ -174,7 +174,7 @@ def []=( field, value )
174174
#
175175
# Update the form inputs.
176176
#
177-
# field - Field name as a Sting (updated if already exists, created otherwise).
177+
# field - Field name as a String (updated if already exists, created otherwise).
178178
# value - Field Value as a String.
179179
# type - Field type ('text' if no type has been provided).
180180
#
@@ -195,7 +195,7 @@ def update( field, value, type = nil )
195195
#
196196
# Get a field type, by name, as a String.
197197
#
198-
# field - Field name as a Sting
198+
# field - Field name as a String
199199
#
200200
def field_type_for( name )
201201
inputs.select{ |i| i[:name] == name.to_s }[:type]

lib/msf/core/data_store.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ def import_options(options, imported_by = nil, overwrite = false)
111111
def import_options_from_s(option_str, delim = nil)
112112
hash = {}
113113

114-
# Figure out the delimeter, default to space.
114+
# Figure out the delimiter, default to space.
115115
if (delim.nil?)
116116
delim = /\s/
117117

@@ -120,7 +120,7 @@ def import_options_from_s(option_str, delim = nil)
120120
end
121121
end
122122

123-
# Split on the delimeter
123+
# Split on the delimiter
124124
option_str.split(delim).each { |opt|
125125
var, val = opt.split('=', 2)
126126

lib/msf/core/data_store_with_fallbacks.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ def import_options(options, imported_by = nil, overwrite = true)
157157
def import_options_from_s(option_str, delim = nil)
158158
hash = {}
159159

160-
# Figure out the delimeter, default to space.
160+
# Figure out the delimiter, default to space.
161161
if (delim.nil?)
162162
delim = /\s/
163163

@@ -166,7 +166,7 @@ def import_options_from_s(option_str, delim = nil)
166166
end
167167
end
168168

169-
# Split on the delimeter
169+
# Split on the delimiter
170170
option_str.split(delim).each { |opt|
171171
var, val = opt.split('=', 2)
172172

lib/msf/core/db_manager/module_cache.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ module Msf::DBManager::ModuleCache
2323
# +'ILIKE'+
2424
#
2525
# @param values [Set<String>, #each] a list of strings.
26-
# @return [Arrray<String>] strings wrapped like %<string>%
26+
# @return [Array<String>] strings wrapped like %<string>%
2727
def match_values(values)
2828
values.collect { |value| "%#{value}%" }
2929
end

lib/msf/core/db_manager/note.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ def notes(opts)
6868
#
6969
# The +:update+ option can have the following values:
7070
# +:unique+:: allow only a single Note per +:host+/+:type+ pair
71-
# +:unique_data+:: like +:uniqe+, but also compare +:data+
71+
# +:unique_data+:: like +:unique+, but also compare +:data+
7272
# +:insert+:: always insert a new Note even if one with identical values exists
7373
#
7474
# If the provided +:host+ is an IP address and does not exist in the

lib/msf/core/encoder.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ def initialize(info)
156156

157157
##
158158
#
159-
# Encoder information accessors that can be overriden
159+
# Encoder information accessors that can be overridden
160160
# by derived classes
161161
#
162162
##

lib/msf/core/exploit.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -336,7 +336,7 @@ def has_auto_target?(targets=[])
336336
# exploit module. It will also pre-generate the desired payload, though
337337
# exploits can re-generate the payload if necessary.
338338
#
339-
# This method is designed to be overriden by exploit modules.
339+
# This method is designed to be overridden by exploit modules.
340340
#
341341
def exploit
342342
end

lib/msf/core/exploit/brute.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ def exploit
147147
# This routine is called once per brute force iteration. The addresses
148148
# parameter is a hash of addresses that are incremented each iteration and
149149
# are derived from the target's bruteforce information or the module's
150-
# datastore in case they are being overriden.
150+
# datastore in case they are being overridden.
151151
#
152152
def brute_exploit(addrs)
153153
end

lib/msf/core/exploit/capture.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -386,7 +386,7 @@ def expire_arpcache
386386
self.arp_cache = {}
387387
end
388388

389-
# For compatibilty with Msf::Exploit::Remote::Ip
389+
# For compatibility with Msf::Exploit::Remote::Ip
390390
def rhost
391391
datastore['RHOST']
392392
end

lib/msf/core/exploit/cmd_stager.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -336,21 +336,21 @@ def compatible_flavor?(f)
336336
end
337337

338338
# Code to execute before the cmd stager stub. This method is designed to be
339-
# overriden by a module this mixin.
339+
# overridden by a module this mixin.
340340
#
341341
# @param opts [Hash] Hash of configuration options.
342342
def execute_cmdstager_begin(opts = {})
343343
end
344344

345345
# Code to execute after the cmd stager stub. This method is designed to be
346-
# overriden by a module this mixin.
346+
# overridden by a module this mixin.
347347
#
348348
# @param opts [Hash] Hash of configuration options.
349349
def execute_cmdstager_end(opts = {})
350350
end
351351

352352
# Code called to execute each command via an arbitrary module-defined vector.
353-
# This method needs to be overriden by modules using this mixin.
353+
# This method needs to be overridden by modules using this mixin.
354354
#
355355
# @param cmd [String] The command to execute.
356356
# @param opts [Hash] Hash of configuration options.

lib/msf/core/exploit/java_deserialization.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module Exploit::JavaDeserialization
1717
#
1818
# @return [String] The opaque data blob.
1919
def generate_java_deserialization_for_command(name, shell, command)
20-
# here we force usage of a modified type to avoid compatibility issues with command characters thar are present in
20+
# here we force usage of a modified type to avoid compatibility issues with command characters that are present in
2121
# some ysoserial payloads
2222
unless %w{ bash cmd powershell }.include? shell
2323
raise RuntimeError, 'Invalid shell for Java Deserialization payload generation'

lib/msf/core/exploit/local/windows_kernel.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ def token_stealing_shellcode(target, backup_token = nil, arch = nil, append_ret
160160
tokenstealing << "\x8b\xc8" # mov ecx, eax
161161
tokenstealing << "\x8b\x98" + target['_TOKEN'] + "\x00\x00\x00" # mov ebx, dword ptr [eax+0C8h] # Retrieves TOKEN
162162
unless backup_token.nil?
163-
tokenstealing << "\x89\x1d" + [backup_token].pack('V') # mov dword ptr ds:backup_token, ebx # Optionaly write a copy of the token to the address provided
163+
tokenstealing << "\x89\x1d" + [backup_token].pack('V') # mov dword ptr ds:backup_token, ebx # Optionally write a copy of the token to the address provided
164164
end
165165
tokenstealing << "\x8b\x80" + target['_APLINKS'] + "\x00\x00\x00" # mov eax, dword ptr [eax+88h] <====| # Retrieve FLINK from ActiveProcessLinks
166166
tokenstealing << "\x81\xe8" + target['_APLINKS'] + "\x00\x00\x00" # sub eax, 88h | # Retrieve _EPROCESS Pointer from the ActiveProcessLinks

lib/msf/core/exploit/powershell.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ def compress_script(script_in, eof = nil)
114114
end
115115

116116
#
117-
# Return a decompressed powershell sript
117+
# Return a decompressed powershell script
118118
#
119119
# @param script_in [String] Compressed contents with decompression stub
120120
#

lib/msf/core/exploit/powershell/dot_net.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ def initialize(info = {})
88
super
99
register_advanced_options(
1010
[
11-
OptString.new('CERT_PATH', [false, 'Path on compiler host to .pfx fomatted certificate for signing' ]),
11+
OptString.new('CERT_PATH', [false, 'Path on compiler host to .pfx formatted certificate for signing' ]),
1212

1313
], self.class)
1414
end

lib/msf/core/exploit/remote/afp.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,8 +91,8 @@ def login(user, pass)
9191
when -5001 #kFPAuthContinue
9292
return parse_login_response_add_send_login_count(response, {:p => p, :g => g, :ra => ra, :ma => ma,
9393
:password => pass, :user => user})
94-
when -5023 #kFPUserNotAuth (User dosen't exists)
95-
print_status("AFP #{rhost}:#{rport} User #{user} dosen't exists")
94+
when -5023 #kFPUserNotAuth (User doesn't exists)
95+
print_status("AFP #{rhost}:#{rport} User #{user} doesn't exists")
9696
return :skip_user
9797
else
9898
return :connection_error

lib/msf/core/exploit/remote/browser_exploit_server.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ def setup
123123
# * It comes from a datastore option. It allows BrowserAutoPwn to share the unique prefix with
124124
# its child exploits, so that these exploits don't have to gather browser information again.
125125
# * If the datastore option isn't set, then we assume the user is firing the exploit as a
126-
# standalone so we make somthing more unique, so that if there are two instances using the
126+
# standalone so we make something more unique, so that if there are two instances using the
127127
# same exploit, they don't actually share info.
128128
def browser_profile_prefix
129129
self.datastore['BrowserProfilePrefix'] || @unique_prefix ||= lambda {

0 commit comments

Comments
 (0)