mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
style compliance fixes
git-svn-id: file:///home/svn/framework3/trunk@10911 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
385450b40d
commit
e84e69c5ef
@ -47,6 +47,6 @@ end
|
||||
outp.rstrip!
|
||||
outp << "\n"
|
||||
|
||||
fd = File.open(path, "w")
|
||||
fd = File.open(path, "wb")
|
||||
fd.write(outp)
|
||||
fd.close
|
@ -59,7 +59,7 @@ insert_statement = database.prepare("INSERT INTO requests(host,port,ssl,meth,pat
|
||||
target_ips = {}
|
||||
|
||||
# Try to open the conversationlog file
|
||||
File.open("#{ws_directory+File::SEPARATOR}conversationlog", "r") do |log|
|
||||
File.open("#{ws_directory+File::SEPARATOR}conversationlog", "rb") do |log|
|
||||
|
||||
# regulare expressions to extract the stuff that we really need
|
||||
# i know that the url stuff can be handeled in one request but
|
||||
@ -175,7 +175,3 @@ File.open("#{ws_directory+File::SEPARATOR}conversationlog", "r") do |log|
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,5 +1,7 @@
|
||||
#!/usr/bin/env ruby
|
||||
|
||||
# $Id$
|
||||
|
||||
#
|
||||
# This script scans a memory dump or firmware image for any password hashes that
|
||||
# happen to match the "master password" list generated by vxmaster. This is a
|
||||
|
@ -1,3 +1,4 @@
|
||||
# $Id$
|
||||
#
|
||||
# This script can be used to calculate hash values for VxWorks passwords.
|
||||
#
|
||||
|
@ -1,5 +1,7 @@
|
||||
#!/usr/bin/env ruby
|
||||
|
||||
# $Id$
|
||||
|
||||
#
|
||||
# This script calculates all possible password hashes for the vxworks platform.
|
||||
# The generated list can be used to bruteforce authentication to any service
|
||||
|
Loading…
Reference in New Issue
Block a user