1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Update specs

This commit is contained in:
jvazquez-r7 2015-03-05 12:24:41 -06:00
parent 5ede40a39d
commit 38f8fe382c
9 changed files with 3 additions and 12 deletions

View File

@ -79,7 +79,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'false.exe'
mod.file_contents = 'metasploit'

View File

@ -67,7 +67,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'false.exe'
mod.file_contents = 'metasploit'

View File

@ -78,7 +78,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'false.exe'
mod.file_contents = 'metasploit'

View File

@ -36,7 +36,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'test.exe'
mod.file_contents = 'metasploit'

View File

@ -35,7 +35,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'test.exe'
mod.file_contents = 'metasploit'

View File

@ -48,7 +48,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'test.exe'
mod.file_contents = 'metasploit'

View File

@ -78,7 +78,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'test.exe'
mod.file_contents = 'metasploit'

View File

@ -84,7 +84,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'test.exe'
mod.file_contents = 'metasploit'
@ -198,7 +197,7 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
smb_data = Rex::Proto::SMB::Constants::SMB_FIND_FILE_BOTH_DIRECTORY_INFO_HDR.make_struct
smb_data.from_s(data)
expect(smb_data.v['FileName']).to eq(Rex::Text.to_unicode(mod.path_name))
expect(smb_data.v['FileName']).to eq(Rex::Text.to_unicode(folder_path))
end
end
end
@ -263,7 +262,7 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
smb_data = Rex::Proto::SMB::Constants::SMB_FIND_FILE_NAMES_INFO_HDR.make_struct
smb_data.from_s(data)
expect(smb_data.v['FileName']).to eq(Rex::Text.to_unicode(mod.path_name))
expect(smb_data.v['FileName']).to eq(Rex::Text.to_unicode(folder_path))
end
end
end
@ -328,7 +327,7 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
smb_data = Rex::Proto::SMB::Constants::SMB_FIND_FILE_FULL_DIRECTORY_INFO_HDR.make_struct
smb_data.from_s(data)
expect(smb_data.v['FileName']).to eq(Rex::Text.to_unicode(mod.path_name))
expect(smb_data.v['FileName']).to eq(Rex::Text.to_unicode(folder_path))
end
end
end

View File

@ -79,7 +79,6 @@ describe Msf::Exploit::Remote::SMB::Server::Share do
mod.lo = 0
mod.hi = 0
mod.share = 'test'
mod.path_name = "\\"
mod.file_name = 'test.exe'
mod.file_contents = 'metasploit'