I hereby claim:
- I am wchen-r7 on github.
- I am wchenr7 (https://keybase.io/wchenr7) on keybase.
- I have a public key whose fingerprint is D20B 6DC3 3C6B 7252 71A2 258E 2384 DB4E F06F 730B
To claim this, I am signing this object:
| <script> | |
| // Case matters, see lib/msf/core/constants.rb | |
| // All of these should match up with constants in ::Msf::HttpClients | |
| var clients_opera = "Opera"; | |
| var clients_ie = "MSIE"; | |
| var clients_ff = "Firefox"; | |
| var clients_chrome = "Chrome"; | |
| var clients_safari = "Safari"; |
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| require 'msf/core' | |
| class Metasploit3 < Msf::Auxiliary | |
| include Msf::Exploit::Remote::HttpClient |
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| require 'msf/core' | |
| class Metasploit3 < Msf::Auxiliary | |
| include Msf::Auxiliary::Report |
| require 'msf/core' | |
| class Metasploit3 < Msf::Auxiliary | |
| include Msf::Exploit::Remote::HttpClient | |
| def initialize(info = {}) | |
| super(update_info(info, | |
| 'Name' => 'HttpClient Example', | |
| 'Description' => %q{ Do a send_request_cgi() }, |
| $ ruby msfd | |
| [*] Initializing msfd... | |
| [*] Running msfd... | |
| $ nc 127.0.0.1 55554 | |
| MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM | |
| MMMMMMMMMMM MMMMMMMMMM | |
| MMMN$ vMMMM | |
| MMMNl MMMMM MMMMM JMMMM | |
| MMMNl MMMMMMMN NMMMMMMM JMMMM |
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| require 'msf/core' | |
| class Metasploit3 < Msf::Auxiliary | |
| Rank = NormalRanking |
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| require 'msf/core' | |
| class Metasploit3 < Msf::Exploit::Remote | |
| Rank = NormalRanking |
| <ruby> | |
| def add_hosts | |
| run_single("hosts -a -R 192.168.1.2-192.168.1.20") | |
| Rex::Socket::RangeWalker.new("192.168.1.2-192.168.1.20").each do |ip| | |
| id = framework.db.get_host(:address => ip).id | |
| framework.db.hosts.update(id, :os_name => 'Microsoft Windows') | |
| framework.db.hosts.update(id, :os_flavor => 'Windows 7') | |
| framework.db.hosts.update(id, :os_sp => 'SP1') |
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| require 'msf/core' | |
| class Metasploit4 < Msf::Exploit::Remote | |
| Rank = GreatRanking |
I hereby claim:
To claim this, I am signing this object: