typo fixes

This commit is contained in:
TrustedSec 2015-12-09 18:21:19 -05:00
parent 1a1cf61ff6
commit 07577ff538
3 changed files with 3 additions and 3 deletions

View file

@ -1138,7 +1138,7 @@ version 3.6
* added Adobe Flash Player Object Type Confusion to the web interface
* fixed a menu bug that would not allow you to return to the previous menu in the java applet
* fixed a bug that would cause the multiattack metasploit, java applet, and cred harvester to not work on the right ports and raise a exceptions
* added background listener to credential harvester and multiattack -- allows credential harvester to continue to run even if metapsloit has been exited
* added background listener to credential harvester and multiattack -- allows credential harvester to continue to run even if metasploit has been exited
* fixed a bug that would still flag any website as cloned successfully. The new code fixes that by checking to ensure the site was properly cloned.
* fixed a cloning web bug that would error out then continue with payload selection
* added a cleanup routine to the web cloner for post completion on the cloner, this fixes a repetitive issue when launching multiple attacks in the menu system

View file

@ -216,7 +216,7 @@ def deploy_hex2binary(ipaddr,port,username,password):
print_status("Starting the Metasploit listener...")
child2 = pexpect.spawn("%smsfconsole -r %s/reports/powershell/powershell.rc" % (msf_path,setdir))
print_status("Waiting for the listener to start first before we continue forward...")
print_status("Be patient, Metaploit takes a little bit to start...")
print_status("Be patient, Metasploit takes a little bit to start...")
child2.expect("Starting the payload handler", timeout=30000)
print_status("Metasploit started... Waiting a couple more seconds for listener to activate..")
time.sleep(5)

View file

@ -341,7 +341,7 @@ try:
shutil.copyfile(setdir + "/web_clone/index.html", apache_dir + "/index.html")
shutil.copyfile(setdir + "/Launcher.hta", apache_dir + "/Launcher.hta")
print_status("Launching Metapsloit.. Please wait one.")
print_status("Launching Metasploit.. Please wait one.")
subprocess.Popen("%smsfconsole -r %s/meta_config" % (meta_path(), setdir), shell=True).wait()
## selection of browser exploits