mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-04-04 14:56:08 +00:00
typo fixes
This commit is contained in:
parent
1a1cf61ff6
commit
07577ff538
3 changed files with 3 additions and 3 deletions
|
@ -1138,7 +1138,7 @@ version 3.6
|
|||
* added Adobe Flash Player Object Type Confusion to the web interface
|
||||
* fixed a menu bug that would not allow you to return to the previous menu in the java applet
|
||||
* fixed a bug that would cause the multiattack metasploit, java applet, and cred harvester to not work on the right ports and raise a exceptions
|
||||
* added background listener to credential harvester and multiattack -- allows credential harvester to continue to run even if metapsloit has been exited
|
||||
* added background listener to credential harvester and multiattack -- allows credential harvester to continue to run even if metasploit has been exited
|
||||
* fixed a bug that would still flag any website as cloned successfully. The new code fixes that by checking to ensure the site was properly cloned.
|
||||
* fixed a cloning web bug that would error out then continue with payload selection
|
||||
* added a cleanup routine to the web cloner for post completion on the cloner, this fixes a repetitive issue when launching multiple attacks in the menu system
|
||||
|
|
|
@ -216,7 +216,7 @@ def deploy_hex2binary(ipaddr,port,username,password):
|
|||
print_status("Starting the Metasploit listener...")
|
||||
child2 = pexpect.spawn("%smsfconsole -r %s/reports/powershell/powershell.rc" % (msf_path,setdir))
|
||||
print_status("Waiting for the listener to start first before we continue forward...")
|
||||
print_status("Be patient, Metaploit takes a little bit to start...")
|
||||
print_status("Be patient, Metasploit takes a little bit to start...")
|
||||
child2.expect("Starting the payload handler", timeout=30000)
|
||||
print_status("Metasploit started... Waiting a couple more seconds for listener to activate..")
|
||||
time.sleep(5)
|
||||
|
|
|
@ -341,7 +341,7 @@ try:
|
|||
shutil.copyfile(setdir + "/web_clone/index.html", apache_dir + "/index.html")
|
||||
shutil.copyfile(setdir + "/Launcher.hta", apache_dir + "/Launcher.hta")
|
||||
|
||||
print_status("Launching Metapsloit.. Please wait one.")
|
||||
print_status("Launching Metasploit.. Please wait one.")
|
||||
subprocess.Popen("%smsfconsole -r %s/meta_config" % (meta_path(), setdir), shell=True).wait()
|
||||
|
||||
## selection of browser exploits
|
||||
|
|
Loading…
Add table
Reference in a new issue