metasploit-framework/lib/msf/jmx.rb

38 lines
798 B
Ruby
Raw Normal View History

2015-01-16 03:18:03 +00:00
# -*- coding: binary -*-
2015-01-16 05:21:54 +00:00
require 'rex/java/serialization'
2015-01-16 03:18:03 +00:00
module Msf
module Jmx
2015-01-16 05:21:54 +00:00
require 'msf/jmx/util'
2015-01-16 03:18:03 +00:00
require 'msf/jmx/discovery'
require 'msf/jmx/handshake'
require 'msf/jmx/mbean'
2015-01-16 05:21:54 +00:00
include Msf::Jmx::Util
2015-01-16 03:18:03 +00:00
include Msf::Jmx::Discovery
include Msf::Jmx::Handshake
2015-01-21 07:00:45 +00:00
include Msf::Jmx::Mbean
2015-01-20 23:29:48 +00:00
def initialize(info = {})
super
register_options(
[
Msf::OptString.new('JMX_ROLE', [false, 'The role to interact with an authenticated JMX endpoint']),
Msf::OptString.new('JMX_PASSWORD', [false, 'The password to interact with an authenticated JMX endpoint'])
2015-01-20 23:29:48 +00:00
], HTTP::Wordpress
)
end
def jmx_role
datastore['JMX_ROLE']
end
def jmx_password
datastore['JMX_PASSWORD']
end
2015-01-16 05:15:30 +00:00
end
2015-01-16 03:18:03 +00:00
end