Skip to content

Instantly share code, notes, and snippets.

@wchen-r7
Created March 27, 2015 22:56
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save wchen-r7/161baa5a0499e556b139 to your computer and use it in GitHub Desktop.
Save wchen-r7/161baa5a0499e556b139 to your computer and use it in GitHub Desktop.
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
def initialize(info={})
super(update_info(info,
'Name' => "HttpServer mixin example",
'Description' => %q{
Here's an example of using the HttpServer mixin
},
'License' => MSF_LICENSE,
'Author' => [ 'sinn3r' ],
'References' =>
[
[ 'URL', 'http://metasploit.com' ]
],
'Platform' => 'win',
'Targets' =>
[
[ 'Generic', {} ],
],
'DisclosureDate' => "Apr 1 2013",
'DefaultTarget' => 0))
end
def run
exploit
end
def on_request_uri(cli, request)
f = fingerprint_user_agent(request.headers['User-Agent'])
print_debug(f.inspect)
send_response(cli, 'ok')
end
end
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment