I hereby claim:
- I am wchen-r7 on github.
- I am wchenr7 (https://keybase.io/wchenr7) on keybase.
- I have a public key whose fingerprint is D20B 6DC3 3C6B 7252 71A2 258E 2384 DB4E F06F 730B
To claim this, I am signing this object:
<script> | |
// Case matters, see lib/msf/core/constants.rb | |
// All of these should match up with constants in ::Msf::HttpClients | |
var clients_opera = "Opera"; | |
var clients_ie = "MSIE"; | |
var clients_ff = "Firefox"; | |
var clients_chrome = "Chrome"; | |
var clients_safari = "Safari"; |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
include Msf::Exploit::Remote::HttpClient |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
include Msf::Auxiliary::Report |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
include Msf::Exploit::Remote::HttpClient | |
def initialize(info = {}) | |
super(update_info(info, | |
'Name' => 'HttpClient Example', | |
'Description' => %q{ Do a send_request_cgi() }, |
$ ruby msfd | |
[*] Initializing msfd... | |
[*] Running msfd... | |
$ nc 127.0.0.1 55554 | |
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM | |
MMMMMMMMMMM MMMMMMMMMM | |
MMMN$ vMMMM | |
MMMNl MMMMM MMMMM JMMMM | |
MMMNl MMMMMMMN NMMMMMMM JMMMM |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
Rank = NormalRanking |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = NormalRanking |
<ruby> | |
def add_hosts | |
run_single("hosts -a -R 192.168.1.2-192.168.1.20") | |
Rex::Socket::RangeWalker.new("192.168.1.2-192.168.1.20").each do |ip| | |
id = framework.db.get_host(:address => ip).id | |
framework.db.hosts.update(id, :os_name => 'Microsoft Windows') | |
framework.db.hosts.update(id, :os_flavor => 'Windows 7') | |
framework.db.hosts.update(id, :os_sp => 'SP1') |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit4 < Msf::Exploit::Remote | |
Rank = GreatRanking |
I hereby claim:
To claim this, I am signing this object: