updated for db usage

git-svn-id: file:///home/svn/framework3/trunk@6485 4d416f70-5f16-0410-b530-b9f4589650da
unstable
cg 2009-04-15 04:15:25 +00:00
parent a2891e86de
commit 0ea4bec847
1 changed files with 13 additions and 4 deletions

View File

@ -16,11 +16,12 @@ class Metasploit3 < Msf::Auxiliary
include Msf::Auxiliary::WMAPScanServer include Msf::Auxiliary::WMAPScanServer
# Scanner mixin should be near last # Scanner mixin should be near last
include Msf::Auxiliary::Scanner include Msf::Auxiliary::Scanner
include Msf::Auxiliary::Report
def initialize def initialize
super( super(
'Name' => 'HTTP Options Detection', 'Name' => 'HTTP Options Detection',
'Version' => '$Revision$', 'Version' => '$Revision:$',
'Description' => 'Display available HTTP options for each system', 'Description' => 'Display available HTTP options for each system',
'Author' => ['CG'], 'Author' => ['CG'],
'License' => MSF_LICENSE 'License' => MSF_LICENSE
@ -28,7 +29,7 @@ class Metasploit3 < Msf::Auxiliary
end end
def run_host(ip) def run_host(target_host)
begin begin
res = send_request_raw({ res = send_request_raw({
@ -38,14 +39,22 @@ class Metasploit3 < Msf::Auxiliary
}, 10) }, 10)
if (res and res.headers['Allow']) if (res and res.headers['Allow'])
print_status("#{ip} allows #{res.headers['Allow']} methods") print_status("#{target_host} allows #{res.headers['Allow']} methods")
rep_id = wmap_base_report_id( rep_id = wmap_base_report_id(
wmap_target_host, wmap_target_host,
wmap_target_port, wmap_target_port,
wmap_target_ssl wmap_target_ssl
) )
report_note(
:host => target_host,
:proto => 'HTTP',
:port => rport,
:type => 'HTTP_OPTIONS',
:data => res.headers['Allow']
)
wmap_report(rep_id,'WEB_SERVER','OPTIONS',"#{res.headers['Allow']}",nil) wmap_report(rep_id,'WEB_SERVER','OPTIONS',"#{res.headers['Allow']}",nil)
else else
print_status("No options.") print_status("No options.")