Remove $Id tags

Also adds binary coding magic comment to a few files
This commit is contained in:
James Lee 2013-05-20 16:21:03 -05:00
parent 604da8442f
commit f4498c3916
104 changed files with 17 additions and 232 deletions

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base'
require 'msf/base/sessions/scriptable'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base/sessions/meterpreter'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'shellwords'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base/sessions/meterpreter'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base/sessions/meterpreter'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base/sessions/meterpreter'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base/sessions/meterpreter'
require 'msf/windows_error'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base'

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Msf
module Sessions

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/base/sessions/command_shell_options'

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Msf

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
###
# $Id$
###
module Msf

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
##
#

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/core'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
#
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/exploitation/cmdstager'
require 'msf/core/exploit/exe'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/core/exploit/cmdstager'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/core/exploit/cmdstager'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/text'
require 'msf/core/exploit/tftp'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'msf/core/exploit/cmdstager'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id: $
require 'msf/core/exploit/cmdstager'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/proto/dhcp'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/exploitation/egghunter'

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
###
#

View File

@ -7,7 +7,6 @@ module Msf
# in a more intelligent way.
#
# Author: jduck
# $Id$
###
module Exploit::FormatString

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Msf

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
#
# All exploit mixins should be added to the list below
#

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/exploitation/omelet'

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
###
#

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
###
#

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Msf

View File

@ -468,6 +468,8 @@ module Exploit::Remote::TcpServer
#
def regenerate_payload(cli, arch = nil, platform = nil, target = nil)
$stderr.puts("Tcp##{__method__} : target: #{target.inspect}")
ohost = datastore['RHOST']
oport = datastore['RPORT']
p = nil
@ -477,7 +479,7 @@ module Exploit::Remote::TcpServer
datastore['RHOST'] = cli.peerhost
datastore['RPORT'] = cli.peerport
if ((p = super(arch, platform, target)) == nil)
if ((p = super(platform, arch, target)) == nil)
print_error("Failed to generate payload")
return nil
end

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Msf

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/proto/tftp'

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
#
# This mixin enables executing arbitrary commands via the

View File

@ -211,10 +211,13 @@ protected
arch = nil
if explicit_arch.nil? == false
$stderr.puts "explicit"
arch = explicit_arch
elsif datastore['ARCH']
$stderr.puts "datastore"
arch = datastore['ARCH']
elsif assoc_exploit
$stderr.puts "assoc_exploit"
arch = assoc_exploit.target_arch || ARCH_X86
end
@ -233,6 +236,8 @@ protected
# Look for one based on the exploit's compatible set
if(assoc_exploit)
$stderr.puts "assoc_exploit #{assoc_exploit.name}"
$stderr.puts "#{actual_arch} #{actual_platform.inspect}"
self.actual_payload = framework.payloads.find_payload_from_set(
assoc_exploit.compatible_payloads,
actual_platform,

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Msf

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Msf

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id: module.rb 12624 2011-05-15 23:51:53Z hdm $
##
module Msf
module RPC

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/parser/arguments'

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
#
# Windows system error codes (0-499)

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module ElfParsey

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/elfparsey/elfbase'
require 'rex/elfparsey/exceptions'
require 'rex/image_source'

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/struct2'
module Rex

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module ElfParsey

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module ElfScan

View File

@ -1,7 +1,5 @@
# -*- coding: binary -*-
# $Id$
module Rex
module ElfScan
module Scanner

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module ElfScan
module Search

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/text'
require 'rex/arch'

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/text'
require 'rkelly'

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module ImageSource

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/image_source/image_source'
require 'rex/struct2'

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module ImageSource
class ImageSource

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/image_source/image_source'
require 'rex/struct2'

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
# Version: $Revision$
##
##
# Rex::OLE - an OLE implementation

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module PeParsey

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module PeParsey

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/image_source'
require 'rex/peparsey/exceptions'
require 'rex/peparsey/pebase'

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/image_source'
require 'rex/peparsey/exceptions'
require 'rex/peparsey/pebase'

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/peparsey/exceptions'
require 'rex/struct2'

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
require 'rex/peparsey/exceptions'
require 'rex/peparsey/pebase'
require 'rex/struct2'

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
# $Id$
module Rex
module PeScan

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
#
# DHCP Server support written by scriptjunkie
#

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/proto/dhcp'
module Rex

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/socket'
require 'rex/proto/dhcp'

View File

@ -43,10 +43,6 @@
# The latter has a minor bug in its separate_keys function.
# The third key has to begin from the 14th character of the
# input string instead of 13th:)
#--
# $Id: ntlm.rb 11678 2011-01-30 19:26:35Z hdm $
#++
require 'rex/proto/ntlm/constants'
require 'rex/proto/ntlm/base'

View File

@ -40,9 +40,6 @@
# The latter has a minor bug in its separate_keys function.
# The third key has to begin from the 14th character of the
# input string instead of 13th:)
#--
# $Id: ntlm.rb 11678 2011-01-30 19:26:35Z hdm $
#++
#this module defines the message class , useful for easily handling type 1/2/3 ntlm messages

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id: $
#
# RFB protocol support
#

View File

@ -1,8 +1,6 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
#
# $Id: $
#
# RFB protocol support
#
# @author Joshua J. Drake <jduck>

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id: $
##
##
#

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id: $
##
##
#

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id: $
##
##
#

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
#
# TFTP Server implementation according to:
#

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/proto/tftp'
module Rex

View File

@ -1,5 +1,4 @@
# -*- coding: binary -*-
# $Id$
require 'rex/socket'
require 'rex/proto/tftp'

View File

@ -1,10 +1,5 @@
#!/usr/bin/env ruby
# -*- coding: binary -*-
#
# $Revision$
#
# $Id$
#
require 'rex/compat'
require 'rex/proto/tftp'

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Rex
module Zip

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Rex
module Zip

View File

@ -1,7 +1,4 @@
# -*- coding: binary -*-
##
# $Id$
##
module Rex
module Zip

View File

@ -1,6 +1,4 @@
##
# $Id: drda.rb 14774 2012-02-21 01:42:17Z rapid7 $
##
# -*- coding: binary -*-
##
# This file is part of the Metasploit Framework and may be subject to

View File

@ -1,6 +1,4 @@
##
# $Id: $
##
# -*- coding: binary -*-
##
# This file is part of the Metasploit Framework and may be subject to

View File

@ -1,6 +1,4 @@
##
# $Id: $
##
# -*- coding: binary -*-
##
# This file is part of the Metasploit Framework and may be subject to

View File

@ -1,6 +1,4 @@
##
# $Id: jboss_deploymentfilerepository.rb 15620 2012-07-12 07:33:06Z rapid7 $
##
# -*- coding: binary -*-
##
# This file is part of the Metasploit Framework and may be subject to

View File

@ -1,6 +1,4 @@
##
# $Id: novelliprint_getdriversettings.rb$
##
# -*- coding: binary -*-
###
# This file is part of the Metasploit Framework and may be subject to

Some files were not shown because too many files have changed in this diff Show More