diff --git a/README.md b/README.md index 328dbe9..deb7e9f 100644 --- a/README.md +++ b/README.md @@ -24,4 +24,4 @@ The exploit works by modifying the server name with a malicious string of charac | Argument | Description | |:----------------------------|:-----------------------------------------------| | `--dev-build` | Do nothing. | -| `--copy-to` | Copy the EXE to a custom folder after build. | +| `--copy-to` | Copy the EXE to a custom folder after build. | \ No newline at end of file diff --git a/src/main.cpp b/src/main.cpp index 542952e..f317bc0 100644 --- a/src/main.cpp +++ b/src/main.cpp @@ -18,10 +18,10 @@ bool startUp() sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); if (INVALID_SOCKET == sock) - { - printf("Can't initialize socket\n"); - return false; - } + { + printf("Can't initialize socket\n"); + return false; + } sockaddr_in service{}; service.sin_family = AF_INET; @@ -68,9 +68,9 @@ DWORD WINAPI recvTh(LPVOID) auto len = recvfrom(sock, buf.get(), BUF_SIZE, 0, (SOCKADDR*)&sender, &senderSize); if (len == SOCKET_ERROR) - { - return 1; - } + { + return 1; + } if (len == sizeof(serverQuery_t)) { @@ -95,9 +95,9 @@ DWORD WINAPI recvTh(LPVOID) int main(int, char**) { if (!startUp()) - { - return 1; - } + { + return 1; + } DWORD dwThreadId; auto thread = CreateThread(0, 0, recvTh, 0, 0, &dwThreadId);