1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00

style compliance fixes

git-svn-id: file:///home/svn/framework3/trunk@10911 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Joshua Drake 2010-11-05 00:06:31 +00:00
parent 385450b40d
commit e84e69c5ef
9 changed files with 43 additions and 42 deletions

View File

@ -47,6 +47,6 @@ end
outp.rstrip!
outp << "\n"
fd = File.open(path, "w")
fd = File.open(path, "wb")
fd.write(outp)
fd.close

View File

@ -59,7 +59,7 @@ insert_statement = database.prepare("INSERT INTO requests(host,port,ssl,meth,pat
target_ips = {}
# Try to open the conversationlog file
File.open("#{ws_directory+File::SEPARATOR}conversationlog", "r") do |log|
File.open("#{ws_directory+File::SEPARATOR}conversationlog", "rb") do |log|
# regulare expressions to extract the stuff that we really need
# i know that the url stuff can be handeled in one request but
@ -175,7 +175,3 @@ File.open("#{ws_directory+File::SEPARATOR}conversationlog", "r") do |log|
end
end
end

View File

@ -1,5 +1,7 @@
#!/usr/bin/env ruby
# $Id$
#
# This script scans a memory dump or firmware image for any password hashes that
# happen to match the "master password" list generated by vxmaster. This is a

View File

@ -1,3 +1,4 @@
# $Id$
#
# This script can be used to calculate hash values for VxWorks passwords.
#

View File

@ -1,5 +1,7 @@
#!/usr/bin/env ruby
# $Id$
#
# This script calculates all possible password hashes for the vxworks platform.
# The generated list can be used to bruteforce authentication to any service