MDM update to support fusion import

unstable
HD Moore 2012-06-13 14:02:40 -07:00
parent 45eb531c23
commit 9351e3ab25
3 changed files with 16 additions and 2 deletions

View File

@ -1,4 +1,4 @@
#!/usr/bin/env ruby_noexec_wrapper
#!/usr/local/rvm/rubies/ruby-1.9.3-p125/bin/ruby
#
# This file was generated by RubyGems.
#

View File

@ -944,6 +944,20 @@ module MetasploitDataModels::ActiveRecordModels::Host
# # fingerprint. Otherwise, it's samba which doesn't give us much of
# # anything in most cases.
# ret[:certainty] = 1.0 if fp.data[:os_name] =~ /Windows/
when 'host.os.fusionvm_fingerprint'
case data[:os]
when /Windows/
ret.update(parse_windows_os_str(data[:os]))
when /Linux ([^[:space:]]*) ([^[:space:]]*) .* (\(.*\))/
ret[:os_name] = "Linux"
ret[:name] = $1
ret[:os_sp] = $2
ret[:arch] = get_arch_from_string($3)
else
ret[:os_name] = data[:os]
end
ret[:arch] = data[:arch] if data[:arch]
ret[:name] = data[:name] if data[:name]
else
# If you've fallen through this far, you've hit a generalized
# pass-through fingerprint parser.

View File

@ -6,7 +6,7 @@ Gem::Specification.new do |s|
s.required_rubygems_version = Gem::Requirement.new("> 1.3.1") if s.respond_to? :required_rubygems_version=
s.authors = ["Trevor Rosen"]
s.date = "2012-06-01"
s.date = "2012-06-13"
s.description = "Implements minimal ActiveRecord models and database helper code used in both the Metasploit Framework (MSF) and Metasploit commercial editions."
s.email = ["trevor_rosen@rapid7.com"]
s.executables = ["mdm_console"]