mirror of
https://github.com/vanhauser-thc/thc-hydra.git
synced 2025-07-06 04:51:40 -07:00
more spelling fixes
This commit is contained in:
parent
b1d9236312
commit
ea3fd5285c
6 changed files with 8 additions and 8 deletions
2
CHANGES
2
CHANGES
|
@ -3,7 +3,7 @@ Changelog for hydra
|
|||
|
||||
|
||||
Release 8.7-dev
|
||||
* ...
|
||||
* added patch from debian maintainers which fixes spellings
|
||||
|
||||
|
||||
Release 8.6
|
||||
|
|
|
@ -61,7 +61,7 @@ int main(int argc, char *argv[]) {
|
|||
gtk_widget_show(wndMain);
|
||||
|
||||
|
||||
/* if we cant use the new cool file chooser, the save button gets disabled */
|
||||
/* if we can't use the new cool file chooser, the save button gets disabled */
|
||||
#ifndef GTK_TYPE_FILE_CHOOSER
|
||||
GtkWidget *btnSave;
|
||||
|
||||
|
|
|
@ -612,7 +612,7 @@ int32_t start_http_form(int32_t s, char *ip, int32_t port, unsigned char options
|
|||
hdrrep(&ptr_head, "^USER^", clogin);
|
||||
hdrrep(&ptr_head, "^PASS^", cpass);
|
||||
|
||||
/* again: no snprintf to be portable. don't worry, buffer cant overflow */
|
||||
/* again: no snprintf to be portable. don't worry, buffer can't overflow */
|
||||
if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) {
|
||||
if (getcookie) {
|
||||
memset(proxy_string, 0, sizeof(proxy_string));
|
||||
|
@ -1199,7 +1199,7 @@ ptr_header_node initialize(char *ip, unsigned char options, char *miscptr) {
|
|||
}
|
||||
}
|
||||
|
||||
/* again: no snprintf to be portable. don't worry, buffer cant overflow */
|
||||
/* again: no snprintf to be portable. don't worry, buffer can't overflow */
|
||||
if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) {
|
||||
// proxy with authentication
|
||||
add_header(&ptr_head, "Host", webtarget, HEADER_TYPE_DEFAULT);
|
||||
|
|
|
@ -109,7 +109,7 @@ int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned cha
|
|||
buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL);
|
||||
to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2));
|
||||
|
||||
/* to be portable, no snprintf, buffer is big enough so it cant overflow */
|
||||
/* to be portable, no snprintf, buffer is big enough so it can't overflow */
|
||||
//send the first..
|
||||
sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1,
|
||||
header);
|
||||
|
|
|
@ -117,7 +117,7 @@ int32_t start_http_proxy(int32_t s, char *ip, int32_t port, unsigned char option
|
|||
buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL);
|
||||
to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2));
|
||||
|
||||
/* to be portable, no snprintf, buffer is big enough so it cant overflow */
|
||||
/* to be portable, no snprintf, buffer is big enough so it can't overflow */
|
||||
//send the first..
|
||||
sprintf(buffer, "GET %s HTTP/1.0\r\n%sProxy-Authorization: NTLM %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\nProxy-Connection: keep-alive\r\n%s\r\n", url, host, buf1, header);
|
||||
if (hydra_send(s, buffer, strlen(buffer), 0) < 0)
|
||||
|
|
|
@ -36,7 +36,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha
|
|||
sprintf(buffer2, "%.50s:%.50s", login, pass);
|
||||
hydra_tobase64((unsigned char *) buffer2, strlen(buffer2), sizeof(buffer2));
|
||||
|
||||
/* again: no snprintf to be portable. don't worry, buffer cant overflow */
|
||||
/* again: no snprintf to be portable. don't worry, buffer can't overflow */
|
||||
if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL)
|
||||
sprintf(buffer, "%s http://%s:%d%.250s HTTP/1.1\r\nHost: %s\r\nConnection: close\r\nAuthorization: Basic %s\r\nProxy-Authorization: Basic %s\r\nUser-Agent: Mozilla/4.0 (Hydra)\r\n%s\r\n",
|
||||
type, webtarget, webport, miscptr, webtarget, buffer2, proxy_authentication[selected_proxy], header);
|
||||
|
@ -82,7 +82,7 @@ int32_t start_http(int32_t s, char *ip, int32_t port, unsigned char options, cha
|
|||
buildAuthRequest((tSmbNtlmAuthRequest *) buf2, 0, NULL, NULL);
|
||||
to64frombits(buf1, buf2, SmbLength((tSmbNtlmAuthRequest *) buf2));
|
||||
|
||||
/* to be portable, no snprintf, buffer is big enough so it cant overflow */
|
||||
/* to be portable, no snprintf, buffer is big enough so it can't overflow */
|
||||
//send the first..
|
||||
if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL)
|
||||
sprintf(buffer,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue