remove rport methods since it is already defined in Msf::Exploit::Remote::HttpClient

bug/bundler_fix
FireFart 2013-09-25 23:50:34 +02:00
parent 84ec2cbf11
commit 09fa7b7692
20 changed files with 0 additions and 80 deletions

View File

@ -45,10 +45,6 @@ class Metasploit4 < Msf::Auxiliary
], self.class)
end
def rport
datastore['RPORT']
end
def run_host(ip)
soapenv='http://schemas.xmlsoap.org/soap/envelope/'
soapenvenc='http://schemas.xmlsoap.org/soap/encoding/'

View File

@ -41,10 +41,6 @@ class Metasploit4 < Msf::Auxiliary
register_autofilter_ports([ 50013 ])
end
def rport
datastore['RPORT']
end
def run_host(ip)
# Check version information to confirm Win/Lin

View File

@ -38,10 +38,6 @@ class Metasploit3 < Msf::Auxiliary
end
def rport
datastore['RPORT']
end
def run
record = "<RECORD>"
record << "<NAME>SRS</NAME><OPERATION>4</OPERATION><CMD>7</CMD>" # Operation

View File

@ -52,10 +52,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
uri = normalize_uri(target_uri.path)
res = send_request_cgi({

View File

@ -48,10 +48,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
@peer = "#{rhost}:#{rport}"
@uri = normalize_uri(target_uri.path)

View File

@ -49,10 +49,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
@peer = "#{rhost}:#{rport}"
@uri = normalize_uri(target_uri.path)

View File

@ -48,10 +48,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
@peer = "#{rhost}:#{rport}"
@uri = normalize_uri(target_uri.path)

View File

@ -37,10 +37,6 @@ class Metasploit3 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI'], "/services/listServices"),

View File

@ -35,10 +35,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -47,10 +47,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -41,10 +41,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -39,10 +39,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -40,10 +40,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -38,10 +38,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => normalize_uri(datastore['URI']),

View File

@ -47,10 +47,6 @@ class Metasploit4 < Msf::Auxiliary
deregister_options('RHOST')
end
def rport
datastore['RPORT']
end
def run_host(ip)
res = send_request_cgi({
'uri' => "/",