Browse Source

Fix typos

wchen-r7 3 years ago
parent
commit
f98efb1345
1 changed files with 2 additions and 2 deletions
  1. 2
    2
      modules/exploits/linux/misc/netcore_udp_53413_backdoor.rb

+ 2
- 2
modules/exploits/linux/misc/netcore_udp_53413_backdoor.rb View File

@@ -19,7 +19,7 @@ class MetasploitModule < Msf::Exploit::Remote
19 19
         equipment in China, have a wide-open backdoor that can be fairly
20 20
         easily exploited by attackers. These products are also sold under
21 21
         the Netis brand name outside of China. This backdoor allows
22
-        cybercriminals to easily run arbitrary code on these routers,
22
+        cyber criminals to easily run arbitrary code on these routers,
23 23
         rendering it vulnerable as a security device.
24 24
         Some models include a non-standard echo command which doesn't
25 25
         honor -e, and are therefore not currently exploitable with
@@ -82,7 +82,7 @@ class MetasploitModule < Msf::Exploit::Remote
82 82
     # netcore is the password to unlock the backdoor
83 83
     send_command('netcore')
84 84
     resp = udp_sock.get(timeout)
85
-    if resp.include?('Login successed!')
85
+    if resp.include?('Login succeeded!')
86 86
       vprint_good('Backdoor Unlocked')
87 87
     end
88 88
   end

Loading…
Cancel
Save