Also pull the Allow headers (previous behavior)
parent
637f86f37d
commit
b760815c86
|
@ -7,7 +7,7 @@ module Msf
|
|||
module Exploit::Remote::SIP
|
||||
# Parses +response+, extracts useful metdata and then reports on it.
|
||||
# Returns true iff the response was a valid SIP response
|
||||
def parse_response(response, rhost, proto, desired_headers = %w(User-Agent Server))
|
||||
def parse_response(response, rhost, proto, desired_headers = %w(User-Agent Server Allow))
|
||||
endpoint = "#{rhost}:#{rport}/#{proto}"
|
||||
begin
|
||||
options_response = Rex::Proto::SIP::Response.parse(response)
|
||||
|
|
Loading…
Reference in New Issue