mirror of
https://github.com/vanhauser-thc/thc-hydra.git
synced 2025-07-05 12:36:09 -07:00
fix various spelling and typography errors
taken from Debian; the changes were authored by: * Julián Moreno Patiño <julian@debian.org> * Daniel Echeverry <epsilon77@gmail.com>
This commit is contained in:
parent
21ae638382
commit
0e6ef089db
16 changed files with 20 additions and 20 deletions
2
CHANGES
2
CHANGES
|
@ -39,7 +39,7 @@ Release 8.4
|
|||
* New protocol: rpcap - thanks to Petar Kaleychev <petar.kaleychev@gmail.com>
|
||||
* New command line options:
|
||||
-y : disables -x 1aA interpretation, thanks to crondaemon for the patch
|
||||
-I : ignore an existing hydra.restore file (dont wait for 10 seconds)
|
||||
-I : ignore an existing hydra.restore file (don't wait for 10 seconds)
|
||||
* hydra-svn: works now with the current libsvn version
|
||||
* hydra-ssh: initial check for password auth support now uses login supplied
|
||||
* Fixed dpl4hydra to be able to update from the web again
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
#!/bin/bash
|
||||
PKG_CONFIG_PATH=$PKG_CONFIG_PATH:/opt/gnome/lib/pkgconfig
|
||||
export PKG_CONFIG_PATH
|
||||
echo "Trying to compile xhydra now (hydra gtk gui) - dont worry if this fails, this is really optional ..."
|
||||
echo "Trying to compile xhydra now (hydra gtk gui) - don't worry if this fails, this is really optional ..."
|
||||
./configure > /dev/null 2> errors
|
||||
test -e Makefile || {
|
||||
echo "Error: configure wasnt happy. Analyse this:"
|
||||
|
|
|
@ -913,7 +913,7 @@ GtkWidget *create_wndMain(void) {
|
|||
gtk_widget_set_name(entTelnet, "entTelnet");
|
||||
gtk_widget_show(entTelnet);
|
||||
gtk_container_add(GTK_CONTAINER(alignment1), entTelnet);
|
||||
gtk_tooltips_set_tip(tooltips, entTelnet, "Insert the return string for a succesfull login", NULL);
|
||||
gtk_tooltips_set_tip(tooltips, entTelnet, "Insert the return string for a successful login", NULL);
|
||||
|
||||
label36 = gtk_label_new("Telnet - Successful Login String");
|
||||
gtk_widget_set_name(label36, "label36");
|
||||
|
|
|
@ -2340,7 +2340,7 @@ addresses and/or DNS names.</property>
|
|||
<child>
|
||||
<widget class="GtkEntry" id="entTelnet">
|
||||
<property name="visible">True</property>
|
||||
<property name="tooltip" translatable="yes">Insert the return string for a succesfull login</property>
|
||||
<property name="tooltip" translatable="yes">Insert the return string for a successful login</property>
|
||||
<property name="can_focus">True</property>
|
||||
<property name="editable">True</property>
|
||||
<property name="visibility">True</property>
|
||||
|
|
|
@ -612,7 +612,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options
|
|||
hdrrep(&ptr_head, "^USER^", clogin);
|
||||
hdrrep(&ptr_head, "^PASS^", cpass);
|
||||
|
||||
/* again: no snprintf to be portable. dont worry, buffer cant overflow */
|
||||
/* again: no snprintf to be portable. don't worry, buffer cant overflow */
|
||||
if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) {
|
||||
if (getcookie) {
|
||||
memset(proxy_string, 0, sizeof(proxy_string));
|
||||
|
@ -1199,7 +1199,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) {
|
|||
}
|
||||
}
|
||||
|
||||
/* again: no snprintf to be portable. dont worry, buffer cant overflow */
|
||||
/* again: no snprintf to be portable. don't worry, buffer cant overflow */
|
||||
if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) {
|
||||
// proxy with authentication
|
||||
add_header(&ptr_head, "Host", webtarget, HEADER_TYPE_DEFAULT);
|
||||
|
|
|
@ -36,7 +36,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha
|
|||
sprintf(buffer2, "%.50s:%.50s", login, pass);
|
||||
hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2));
|
||||
|
||||
/* again: no snprintf to be portable. dont worry, buffer cant overflow */
|
||||
/* again: no snprintf to be portable. don't worry, buffer cant overflow */
|
||||
if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL)
|
||||
sprintf(buffer, "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: Basic %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n",
|
||||
type, webtarget, webport, miscptr, webtarget, buffer2, proxy_authentication[selected_proxy], header);
|
||||
|
|
|
@ -466,6 +466,6 @@ void usage_ldap(const char* service) {
|
|||
"Special notes for Simple method has 3 operation modes: anonymous, (no user no pass),\n"
|
||||
"unauthenticated (user but no pass), user/pass authenticated (user and pass).\n"
|
||||
"So don't forget to set empty string as user/pass to test all modes.\n"
|
||||
"Hint: to authenticate to a windows active directy ldap, this is usually\n"
|
||||
"Hint: to authenticate to a windows active directory ldap, this is usually\n"
|
||||
" cn=^USER^,cn=users,dc=foo,dc=bar,dc=com for domain foo.bar.com\n\n", service);
|
||||
}
|
||||
|
|
|
@ -534,7 +534,7 @@ int32_t internal__hydra_connect_to_ssl(int32_t socket, char *hostname) {
|
|||
// SSL_CTX_set_options(sslContext, SSL_OP_NO_SSLv2);
|
||||
// SSL_CTX_set_options(sslContext, SSL_OP_NO_TLSv1);
|
||||
|
||||
/* we set the default verifiers and dont care for the results */
|
||||
/* we set the default verifiers and don't care for the results */
|
||||
(void) SSL_CTX_set_default_verify_paths(sslContext);
|
||||
#if OPENSSL_VERSION_NUMBER < 0x10100000L
|
||||
SSL_CTX_set_tmp_rsa_callback(sslContext, ssl_temp_rsa_cb);
|
||||
|
|
|
@ -620,7 +620,7 @@ int32_t service_pop3_init(char *ip, int32_t sp, unsigned char options, char *mis
|
|||
#endif
|
||||
|
||||
if (hydra_send(sock, quit_str, strlen(quit_str), 0) < 0) {
|
||||
//we dont care if the server is not receiving the quit msg
|
||||
//we don't care if the server is not receiving the quit msg
|
||||
}
|
||||
hydra_disconnect(sock);
|
||||
|
||||
|
|
|
@ -182,7 +182,7 @@ void service_smtp_enum(char *ip, int32_t sp, unsigned char options, char *miscpt
|
|||
if ((buf = hydra_receive_line(sock)) == NULL)
|
||||
hydra_child_exit(2);
|
||||
if (strstr(buf, "220") == NULL) {
|
||||
hydra_report(stderr, "Warning: SMTP does not allow to connect: %s\n", buf);
|
||||
hydra_report(stderr, "Warning: SMTP does not allow connecting: %s\n", buf);
|
||||
hydra_child_exit(2);
|
||||
}
|
||||
// while (strstr(buf, "220 ") == NULL) {
|
||||
|
|
|
@ -290,7 +290,7 @@ void service_smtp(char *ip, int32_t sp, unsigned char options, char *miscptr, FI
|
|||
if ((buf = hydra_receive_line(sock)) == NULL)
|
||||
hydra_child_exit(2);
|
||||
if (strstr(buf, "220") == NULL) {
|
||||
hydra_report(stderr, "[WARNING] SMTP does not allow to connect: %s\n", buf);
|
||||
hydra_report(stderr, "[WARNING] SMTP does not allow connecting: %s\n", buf);
|
||||
free(buf);
|
||||
hydra_child_exit(2);
|
||||
}
|
||||
|
|
|
@ -301,7 +301,7 @@ int32_t start_snmp(int32_t s, char *ip, int32_t port, unsigned char options, cha
|
|||
i += 2;
|
||||
} else {
|
||||
buffer[i + 1] = 8;
|
||||
memcpy(buffer + i + 2, salt, 8); // uninitialized and we dont care
|
||||
memcpy(buffer + i + 2, salt, 8); // uninitialized and we don't care
|
||||
i += 10;
|
||||
}
|
||||
|
||||
|
|
4
hydra.1
4
hydra.1
|
@ -92,7 +92,7 @@ tried on all logins, then the next password.
|
|||
exit after the first found login/password pair (per host if \-M)
|
||||
.TP
|
||||
.B \-F
|
||||
exit after the first found login/password pair for any host (for usage with -M)
|
||||
exit after the first found login/password pair for any host (for usage with \-M)
|
||||
.TP
|
||||
.B \-M FILE
|
||||
server list for parallel attacks, one entry per line
|
||||
|
@ -130,7 +130,7 @@ verbose mode / show login+pass combination for each attempt
|
|||
debug mode
|
||||
.TP
|
||||
.B \-I
|
||||
ignore an existing restore file (dont wait 10 seconds)
|
||||
ignore an existing restore file (don't wait 10 seconds)
|
||||
.TP
|
||||
.B \-h, \-\-help
|
||||
Show summary of options.
|
||||
|
|
6
hydra.c
6
hydra.c
|
@ -516,7 +516,7 @@ void help(int32_t ext) {
|
|||
"[service://server[:PORT][/OPT]]\n");
|
||||
PRINT_NORMAL(ext, "\nOptions:\n");
|
||||
PRINT_EXTEND(ext, " -R restore a previous aborted/crashed session\n"
|
||||
" -I ignore an existing restore file (dont wait 10 seconds)\n"
|
||||
" -I ignore an existing restore file (don't wait 10 seconds)\n"
|
||||
#ifdef LIBOPENSSL
|
||||
" -S perform an SSL connect\n"
|
||||
#endif
|
||||
|
@ -2434,7 +2434,7 @@ int32_t main(int32_t argc, char *argv[]) {
|
|||
#endif
|
||||
|
||||
if (debug)
|
||||
printf("[DEBUG] Ouput color flag is %d\n", colored_output);
|
||||
printf("[DEBUG] Output color flag is %d\n", colored_output);
|
||||
|
||||
if (hydra_options.restore && argc > 2 + debug + verbose)
|
||||
fprintf(stderr, "[WARNING] options after -R are now honored (since v8.6)\n");
|
||||
|
@ -4037,7 +4037,7 @@ int32_t main(int32_t argc, char *argv[]) {
|
|||
}
|
||||
|
||||
if (debug)
|
||||
printf("[DEBUG] killing all remaining childs now that might be stuck\n");
|
||||
printf("[DEBUG] killing all remaining children now that might be stuck\n");
|
||||
for (i = 0; i < hydra_options.max_use; i++)
|
||||
if (hydra_heads[i]->active == HEAD_ACTIVE && hydra_heads[i]->pid > 0)
|
||||
hydra_kill_head(i, 1, 3);
|
||||
|
|
2
ntlm.c
2
ntlm.c
|
@ -1321,7 +1321,7 @@ void dumpAuthChallenge(FILE * fp, tSmbNtlmAuthChallenge * challenge) {
|
|||
fprintf(fp, " Flags = %08x\n", IVAL(&challenge->flags, 0));
|
||||
fprintf(fp, " Challenge = ");
|
||||
dumpRaw(fp, challenge->challengeData, 8);
|
||||
fprintf(fp, " Uncomplete!! parse optional parameters\n");
|
||||
fprintf(fp, " Incomplete!! parse optional parameters\n");
|
||||
}
|
||||
|
||||
void dumpAuthResponse(FILE * fp, tSmbNtlmAuthResponse * response) {
|
||||
|
|
|
@ -34,7 +34,7 @@ Release 8.4
|
|||
* New protocol: rpcap - thanks to Petar Kaleychev <petar.kaleychev@gmail.com>
|
||||
* New command line options:
|
||||
-y : disables -x 1aA interpretation, thanks to crondaemon for the patch
|
||||
-I : ignore an existing hydra.restore file (dont wait for 10 seconds)
|
||||
-I : ignore an existing hydra.restore file (don't wait for 10 seconds)
|
||||
* hydra-svn: works now with the current libsvn version
|
||||
* hydra-ssh: initial check for password auth support now uses login supplied
|
||||
* Fixed dpl4hydra to be able to update from the web again
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue