decribe -> RSpec.describe

MSP-13484

Disabled expose_dsl_globally in spec_helper, so need to qualify
top-level describe.
bug/bundler_fix
Luke Imhoff 2015-10-16 15:57:04 -05:00 committed by Brent Cook
parent ed1e984b6a
commit d6bf0fd781
293 changed files with 295 additions and 296 deletions

View File

@ -1,7 +1,7 @@
# -*- coding:binary -*- # -*- coding:binary -*-
require 'spec_helper' require 'spec_helper'
describe ActiveRecord::ConnectionAdapters::ConnectionPool do RSpec.describe ActiveRecord::ConnectionAdapters::ConnectionPool do
self.use_transactional_fixtures = false self.use_transactional_fixtures = false
def database_configurations def database_configurations

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/credential_collection' require 'metasploit/framework/credential_collection'
describe Metasploit::Framework::CredentialCollection do RSpec.describe Metasploit::Framework::CredentialCollection do
subject(:collection) do subject(:collection) do
described_class.new( described_class.new(

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/credential' require 'metasploit/framework/credential'
describe Metasploit::Framework::Credential do RSpec.describe Metasploit::Framework::Credential do
subject(:cred_detail) { subject(:cred_detail) {
described_class.new described_class.new

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/jtr/cracker' require 'metasploit/framework/jtr/cracker'
describe Metasploit::Framework::JtR::Cracker do RSpec.describe Metasploit::Framework::JtR::Cracker do
subject(:cracker) { described_class.new } subject(:cracker) { described_class.new }
let(:john_path) { '/path/to/john' } let(:john_path) { '/path/to/john' }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/jtr/invalid_wordlist' require 'metasploit/framework/jtr/invalid_wordlist'
describe Metasploit::Framework::JtR::InvalidWordlist do RSpec.describe Metasploit::Framework::JtR::InvalidWordlist do
subject(:invalid) do subject(:invalid) do
described_class.new(model) described_class.new(model)

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/jtr/wordlist' require 'metasploit/framework/jtr/wordlist'
describe Metasploit::Framework::JtR::Wordlist do RSpec.describe Metasploit::Framework::JtR::Wordlist do
subject(:wordlist) { described_class.new } subject(:wordlist) { described_class.new }

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/afp' require 'metasploit/framework/login_scanner/afp'
describe Metasploit::Framework::LoginScanner::AFP do RSpec.describe Metasploit::Framework::LoginScanner::AFP do
subject(:scanner) { described_class.new } subject(:scanner) { described_class.new }

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/axis2' require 'metasploit/framework/login_scanner/axis2'
describe Metasploit::Framework::LoginScanner::Axis2 do RSpec.describe Metasploit::Framework::LoginScanner::Axis2 do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/base' require 'metasploit/framework/login_scanner/base'
describe Metasploit::Framework::LoginScanner::Base do RSpec.describe Metasploit::Framework::LoginScanner::Base do
let(:base_class) { let(:base_class) {
Class.new do Class.new do

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/buffalo' require 'metasploit/framework/login_scanner/buffalo'
describe Metasploit::Framework::LoginScanner::Buffalo do RSpec.describe Metasploit::Framework::LoginScanner::Buffalo do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/chef_webui' require 'metasploit/framework/login_scanner/chef_webui'
describe Metasploit::Framework::LoginScanner::ChefWebUI do RSpec.describe Metasploit::Framework::LoginScanner::ChefWebUI do
subject(:http_scanner) { described_class.new } subject(:http_scanner) { described_class.new }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/db2' require 'metasploit/framework/login_scanner/db2'
describe Metasploit::Framework::LoginScanner::DB2 do RSpec.describe Metasploit::Framework::LoginScanner::DB2 do
let(:public) { 'root' } let(:public) { 'root' }
let(:private) { 'toor' } let(:private) { 'toor' }
let(:test_cred) { let(:test_cred) {

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/ftp' require 'metasploit/framework/login_scanner/ftp'
describe Metasploit::Framework::LoginScanner::FTP do RSpec.describe Metasploit::Framework::LoginScanner::FTP do
let(:public) { 'root' } let(:public) { 'root' }
let(:private) { 'toor' } let(:private) { 'toor' }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/gitlab' require 'metasploit/framework/login_scanner/gitlab'
describe Metasploit::Framework::LoginScanner::GitLab do RSpec.describe Metasploit::Framework::LoginScanner::GitLab do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/glassfish' require 'metasploit/framework/login_scanner/glassfish'
describe Metasploit::Framework::LoginScanner::Glassfish do RSpec.describe Metasploit::Framework::LoginScanner::Glassfish do
subject(:http_scanner) { described_class.new } subject(:http_scanner) { described_class.new }

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/http' require 'metasploit/framework/login_scanner/http'
describe Metasploit::Framework::LoginScanner::HTTP do RSpec.describe Metasploit::Framework::LoginScanner::HTTP do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/invalid' require 'metasploit/framework/login_scanner/invalid'
describe Metasploit::Framework::LoginScanner::Invalid do RSpec.describe Metasploit::Framework::LoginScanner::Invalid do
subject(:invalid) do subject(:invalid) do
described_class.new(model) described_class.new(model)

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/ipboard' require 'metasploit/framework/login_scanner/ipboard'
describe Metasploit::Framework::LoginScanner::IPBoard do RSpec.describe Metasploit::Framework::LoginScanner::IPBoard do
subject { described_class.new } subject { described_class.new }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/jenkins' require 'metasploit/framework/login_scanner/jenkins'
describe Metasploit::Framework::LoginScanner::Jenkins do RSpec.describe Metasploit::Framework::LoginScanner::Jenkins do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/manageengine_desktop_central' require 'metasploit/framework/login_scanner/manageengine_desktop_central'
describe Metasploit::Framework::LoginScanner::ManageEngineDesktopCentral do RSpec.describe Metasploit::Framework::LoginScanner::ManageEngineDesktopCentral do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/mssql' require 'metasploit/framework/login_scanner/mssql'
describe Metasploit::Framework::LoginScanner::MSSQL do RSpec.describe Metasploit::Framework::LoginScanner::MSSQL do
let(:public) { 'root' } let(:public) { 'root' }
let(:private) { 'toor' } let(:private) { 'toor' }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/mybook_live' require 'metasploit/framework/login_scanner/mybook_live'
describe Metasploit::Framework::LoginScanner::MyBookLive do RSpec.describe Metasploit::Framework::LoginScanner::MyBookLive do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/mysql' require 'metasploit/framework/login_scanner/mysql'
describe Metasploit::Framework::LoginScanner::MySQL do RSpec.describe Metasploit::Framework::LoginScanner::MySQL do
let(:public) { 'root' } let(:public) { 'root' }
let(:private) { 'toor' } let(:private) { 'toor' }
let(:pub_blank) { let(:pub_blank) {

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/nessus' require 'metasploit/framework/login_scanner/nessus'
describe Metasploit::Framework::LoginScanner::Nessus do RSpec.describe Metasploit::Framework::LoginScanner::Nessus do
subject(:http_scanner) { described_class.new } subject(:http_scanner) { described_class.new }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/pop3' require 'metasploit/framework/login_scanner/pop3'
describe Metasploit::Framework::LoginScanner::POP3 do RSpec.describe Metasploit::Framework::LoginScanner::POP3 do
subject(:scanner) { described_class.new } subject(:scanner) { described_class.new }
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: false, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: false, has_default_realm: false

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/postgres' require 'metasploit/framework/login_scanner/postgres'
describe Metasploit::Framework::LoginScanner::Postgres do RSpec.describe Metasploit::Framework::LoginScanner::Postgres do
let(:public) { 'root' } let(:public) { 'root' }
let(:private) { 'toor' } let(:private) { 'toor' }
let(:realm) { 'template1' } let(:realm) { 'template1' }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner' require 'metasploit/framework/login_scanner'
describe Metasploit::Framework::LoginScanner::Result do RSpec.describe Metasploit::Framework::LoginScanner::Result do
let(:private) { 'toor' } let(:private) { 'toor' }
let(:proof) { 'foobar' } let(:proof) { 'foobar' }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/smb' require 'metasploit/framework/login_scanner/smb'
describe Metasploit::Framework::LoginScanner::SMB do RSpec.describe Metasploit::Framework::LoginScanner::SMB do
let(:public) { 'root' } let(:public) { 'root' }
let(:private) { 'toor' } let(:private) { 'toor' }

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/smh' require 'metasploit/framework/login_scanner/smh'
describe Metasploit::Framework::LoginScanner::Smh do RSpec.describe Metasploit::Framework::LoginScanner::Smh do
subject(:smh_cli) { described_class.new } subject(:smh_cli) { described_class.new }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/snmp' require 'metasploit/framework/login_scanner/snmp'
describe Metasploit::Framework::LoginScanner::SNMP do RSpec.describe Metasploit::Framework::LoginScanner::SNMP do
let(:public) { 'public' } let(:public) { 'public' }
let(:private) { nil } let(:private) { nil }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/ssh' require 'metasploit/framework/login_scanner/ssh'
describe Metasploit::Framework::LoginScanner::SSH do RSpec.describe Metasploit::Framework::LoginScanner::SSH do
let(:public) { 'root' } let(:public) { 'root' }
let(:private) { 'toor' } let(:private) { 'toor' }
let(:key) { OpenSSL::PKey::RSA.generate(2048).to_s } let(:key) { OpenSSL::PKey::RSA.generate(2048).to_s }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/symantec_web_gateway' require 'metasploit/framework/login_scanner/symantec_web_gateway'
describe Metasploit::Framework::LoginScanner::SymantecWebGateway do RSpec.describe Metasploit::Framework::LoginScanner::SymantecWebGateway do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/telnet' require 'metasploit/framework/login_scanner/telnet'
describe Metasploit::Framework::LoginScanner::Telnet do RSpec.describe Metasploit::Framework::LoginScanner::Telnet do
subject(:login_scanner) { described_class.new } subject(:login_scanner) { described_class.new }

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/tomcat' require 'metasploit/framework/login_scanner/tomcat'
describe Metasploit::Framework::LoginScanner::Tomcat do RSpec.describe Metasploit::Framework::LoginScanner::Tomcat do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/vmauthd' require 'metasploit/framework/login_scanner/vmauthd'
describe Metasploit::Framework::LoginScanner::VMAUTHD do RSpec.describe Metasploit::Framework::LoginScanner::VMAUTHD do
subject(:scanner) { described_class.new } subject(:scanner) { described_class.new }
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: false, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: false, has_default_realm: false

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/vnc' require 'metasploit/framework/login_scanner/vnc'
describe Metasploit::Framework::LoginScanner::VNC do RSpec.describe Metasploit::Framework::LoginScanner::VNC do
let(:private) { 'password' } let(:private) { 'password' }
let(:blank) { '' } let(:blank) { '' }
let(:test_cred) { let(:test_cred) {

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/winrm' require 'metasploit/framework/login_scanner/winrm'
describe Metasploit::Framework::LoginScanner::WinRM do RSpec.describe Metasploit::Framework::LoginScanner::WinRM do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: true it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: true
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/wordpress_rpc' require 'metasploit/framework/login_scanner/wordpress_rpc'
describe Metasploit::Framework::LoginScanner::WordpressRPC do RSpec.describe Metasploit::Framework::LoginScanner::WordpressRPC do
it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false it_behaves_like 'Metasploit::Framework::LoginScanner::Base', has_realm_key: true, has_default_realm: false
it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket' it_behaves_like 'Metasploit::Framework::LoginScanner::RexSocket'

View File

@ -2,7 +2,7 @@
require 'spec_helper' require 'spec_helper'
require 'metasploit/framework/login_scanner/zabbix' require 'metasploit/framework/login_scanner/zabbix'
describe Metasploit::Framework::LoginScanner::Zabbix do RSpec.describe Metasploit::Framework::LoginScanner::Zabbix do
subject(:http_scanner) { described_class.new } subject(:http_scanner) { described_class.new }

View File

@ -4,7 +4,7 @@ require 'metasploit/framework/login_scanner/http'
require 'metasploit/framework/login_scanner/smb' require 'metasploit/framework/login_scanner/smb'
require 'metasploit/framework/login_scanner/vnc' require 'metasploit/framework/login_scanner/vnc'
describe Metasploit::Framework::LoginScanner do RSpec.describe Metasploit::Framework::LoginScanner do
subject { described_class.classes_for_service(service) } subject { described_class.classes_for_service(service) }
let(:port) { nil } let(:port) { nil }

View File

@ -3,7 +3,7 @@ require 'msf/base/sessions/meterpreter'
require 'rex/post/meterpreter/extensions/stdapi/net/interface' require 'rex/post/meterpreter/extensions/stdapi/net/interface'
require 'rex/post/meterpreter/extensions/stdapi/net/route' require 'rex/post/meterpreter/extensions/stdapi/net/route'
describe Msf::Sessions::Meterpreter do RSpec.describe Msf::Sessions::Meterpreter do
before do before do
allow_any_instance_of(Rex::Post::Meterpreter::PacketDispatcher).to receive(:monitor_socket) allow_any_instance_of(Rex::Post::Meterpreter::PacketDispatcher).to receive(:monitor_socket)
end end

View File

@ -1,6 +1,6 @@
require 'spec_helper' require 'spec_helper'
describe Msf::Simple::Framework do RSpec.describe Msf::Simple::Framework do
include_context 'Msf::Simple::Framework' include_context 'Msf::Simple::Framework'
subject do subject do

View File

@ -1,6 +1,6 @@
require 'spec_helper' require 'spec_helper'
describe Msf::Author do RSpec.describe Msf::Author do
context 'KNOWN' do context 'KNOWN' do
subject(:known) { subject(:known) {

View File

@ -3,7 +3,7 @@ require 'spec_helper'
require 'msf/core/auxiliary/drdos' require 'msf/core/auxiliary/drdos'
describe Msf::Auxiliary::DRDoS do RSpec.describe Msf::Auxiliary::DRDoS do
subject do subject do
mod = Module.new mod = Module.new
mod.extend described_class mod.extend described_class

View File

@ -3,7 +3,7 @@
require 'spec_helper' require 'spec_helper'
require 'msf/core/auxiliary/kademlia' require 'msf/core/auxiliary/kademlia'
describe Msf::Auxiliary::Kademlia do RSpec.describe Msf::Auxiliary::Kademlia do
subject(:kad) do subject(:kad) do
mod = Module.new mod = Module.new
mod.extend described_class mod.extend described_class

View File

@ -32,7 +32,7 @@ shared_examples "datastore" do
end end
end end
describe Msf::DataStore do RSpec.describe Msf::DataStore do
describe "#import_option" do describe "#import_option" do
subject do subject do

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'msf/core/encoded_payload' require 'msf/core/encoded_payload'
describe Msf::EncodedPayload do RSpec.describe Msf::EncodedPayload do
include_context 'Msf::Simple::Framework#modules loading' include_context 'Msf::Simple::Framework#modules loading'
before do before do

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'msf/core/exe/segment_appender' require 'msf/core/exe/segment_appender'
describe Msf::Exe::SegmentAppender do RSpec.describe Msf::Exe::SegmentAppender do
let(:opts) do let(:opts) do
option_hash = { option_hash = {

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'msf/core/exe/segment_injector' require 'msf/core/exe/segment_injector'
describe Msf::Exe::SegmentInjector do RSpec.describe Msf::Exe::SegmentInjector do
let(:opts) do let(:opts) do
option_hash = { option_hash = {

View File

@ -1,6 +1,6 @@
require 'msf/core' require 'msf/core'
describe Msf::Exploit::Remote::BrowserAutopwn2 do RSpec.describe Msf::Exploit::Remote::BrowserAutopwn2 do

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/module' require 'msf/core/module'
require 'msf/core/exploit/capture' require 'msf/core/exploit/capture'
describe Msf::Exploit::Capture do RSpec.describe Msf::Exploit::Capture do
subject do subject do
mod = Msf::Module.new mod = Msf::Module.new

View File

@ -3,7 +3,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/cmdstager' require 'msf/core/exploit/cmdstager'
describe Msf::Exploit::CmdStager do RSpec.describe Msf::Exploit::CmdStager do
def create_exploit(info ={}) def create_exploit(info ={})
mod = Msf::Exploit.allocate mod = Msf::Exploit.allocate

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/data_store' require 'msf/core/data_store'
require 'msf/core/exploit/http/client' require 'msf/core/exploit/http/client'
describe Msf::Exploit::Remote::HttpClient do RSpec.describe Msf::Exploit::Remote::HttpClient do
subject do subject do
mod = ::Msf::Module.new mod = ::Msf::Module.new
mod.extend described_class mod.extend described_class

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/http/jboss' require 'msf/core/exploit/http/jboss'
describe Msf::Exploit::Remote::HTTP::JBoss::Base do RSpec.describe Msf::Exploit::Remote::HTTP::JBoss::Base do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend Msf::Exploit::Remote::HTTP::JBoss mod.extend Msf::Exploit::Remote::HTTP::JBoss

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/http/jboss' require 'msf/core/exploit/http/jboss'
describe Msf::Exploit::Remote::HTTP::JBoss::BeanShellScripts do RSpec.describe Msf::Exploit::Remote::HTTP::JBoss::BeanShellScripts do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend Msf::Exploit::Remote::HTTP::JBoss mod.extend Msf::Exploit::Remote::HTTP::JBoss

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/http/jboss' require 'msf/core/exploit/http/jboss'
describe Msf::Exploit::Remote::HTTP::JBoss::BeanShell do RSpec.describe Msf::Exploit::Remote::HTTP::JBoss::BeanShell do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/http/jboss' require 'msf/core/exploit/http/jboss'
describe Msf::Exploit::Remote::HTTP::JBoss::DeploymentFileRepositoryScripts do RSpec.describe Msf::Exploit::Remote::HTTP::JBoss::DeploymentFileRepositoryScripts do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend Msf::Exploit::Remote::HTTP::JBoss mod.extend Msf::Exploit::Remote::HTTP::JBoss

View File

@ -4,8 +4,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/http/jboss' require 'msf/core/exploit/http/jboss'
describe Msf::Exploit::Remote::HTTP::JBoss::DeploymentFileRepository do RSpec.describe Msf::Exploit::Remote::HTTP::JBoss::DeploymentFileRepository do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend Msf::Exploit::Remote::HTTP::JBoss mod.extend Msf::Exploit::Remote::HTTP::JBoss

View File

@ -5,7 +5,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/http/server' require 'msf/core/exploit/http/server'
describe Msf::Exploit::Remote::HttpServer do RSpec.describe Msf::Exploit::Remote::HttpServer do
subject(:server_module) do subject(:server_module) do
mod = Msf::Exploit.allocate mod = Msf::Exploit.allocate

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'rex/proto/http/response' require 'rex/proto/http/response'
require 'msf/core/exploit/http/typo3' require 'msf/core/exploit/http/typo3'
describe Msf::Exploit::Remote::HTTP::Typo3 do RSpec.describe Msf::Exploit::Remote::HTTP::Typo3 do
subject do subject do
mod = ::Msf::Module.new mod = ::Msf::Module.new
mod.extend described_class mod.extend described_class

View File

@ -6,7 +6,7 @@ require 'msf/core/exploit'
require 'rex/proto/http/response' require 'rex/proto/http/response'
require 'msf/core/exploit/http/wordpress' require 'msf/core/exploit/http/wordpress'
describe Msf::Exploit::Remote::HTTP::Wordpress::Base do RSpec.describe Msf::Exploit::Remote::HTTP::Wordpress::Base do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::HTTP::Wordpress mod.extend ::Msf::Exploit::Remote::HTTP::Wordpress

View File

@ -6,7 +6,7 @@ require 'msf/core/exploit'
require 'rex/proto/http/response' require 'rex/proto/http/response'
require 'msf/core/exploit/http/wordpress' require 'msf/core/exploit/http/wordpress'
describe Msf::Exploit::Remote::HTTP::Wordpress::Login do RSpec.describe Msf::Exploit::Remote::HTTP::Wordpress::Login do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::HTTP::Wordpress mod.extend ::Msf::Exploit::Remote::HTTP::Wordpress

View File

@ -6,7 +6,7 @@ require 'msf/core/exploit'
require 'rex/proto/http/response' require 'rex/proto/http/response'
require 'msf/core/exploit/http/wordpress' require 'msf/core/exploit/http/wordpress'
describe Msf::Exploit::Remote::HTTP::Wordpress::Version do RSpec.describe Msf::Exploit::Remote::HTTP::Wordpress::Version do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::HTTP::Wordpress mod.extend ::Msf::Exploit::Remote::HTTP::Wordpress

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/proto/kerberos' require 'rex/proto/kerberos'
require 'msf/core/exploit/kerberos/client' require 'msf/core/exploit/kerberos/client'
describe Msf::Exploit::Remote::Kerberos::Client::AsRequest do RSpec.describe Msf::Exploit::Remote::Kerberos::Client::AsRequest do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Kerberos::Client mod.extend ::Msf::Exploit::Remote::Kerberos::Client

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/proto/kerberos' require 'rex/proto/kerberos'
require 'msf/core/exploit/kerberos/client' require 'msf/core/exploit/kerberos/client'
describe Msf::Exploit::Remote::Kerberos::Client::AsResponse do RSpec.describe Msf::Exploit::Remote::Kerberos::Client::AsResponse do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Kerberos::Client mod.extend ::Msf::Exploit::Remote::Kerberos::Client

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/proto/kerberos' require 'rex/proto/kerberos'
require 'msf/core/exploit/kerberos/client' require 'msf/core/exploit/kerberos/client'
describe Msf::Exploit::Remote::Kerberos::Client::Base do RSpec.describe Msf::Exploit::Remote::Kerberos::Client::Base do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Kerberos::Client mod.extend ::Msf::Exploit::Remote::Kerberos::Client

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/proto/kerberos' require 'rex/proto/kerberos'
require 'msf/core/exploit/kerberos/client' require 'msf/core/exploit/kerberos/client'
describe Msf::Exploit::Remote::Kerberos::Client::CacheCredential do RSpec.describe Msf::Exploit::Remote::Kerberos::Client::CacheCredential do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Kerberos::Client mod.extend ::Msf::Exploit::Remote::Kerberos::Client

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/proto/kerberos' require 'rex/proto/kerberos'
require 'msf/core/exploit/kerberos/client' require 'msf/core/exploit/kerberos/client'
describe Msf::Exploit::Remote::Kerberos::Client::Pac do RSpec.describe Msf::Exploit::Remote::Kerberos::Client::Pac do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Kerberos::Client mod.extend ::Msf::Exploit::Remote::Kerberos::Client

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/proto/kerberos' require 'rex/proto/kerberos'
require 'msf/core/exploit/kerberos/client' require 'msf/core/exploit/kerberos/client'
describe Msf::Exploit::Remote::Kerberos::Client::TgsRequest do RSpec.describe Msf::Exploit::Remote::Kerberos::Client::TgsRequest do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Kerberos::Client mod.extend ::Msf::Exploit::Remote::Kerberos::Client

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/proto/kerberos' require 'rex/proto/kerberos'
require 'msf/core/exploit/kerberos/client' require 'msf/core/exploit/kerberos/client'
describe Msf::Exploit::Remote::Kerberos::Client::TgsResponse do RSpec.describe Msf::Exploit::Remote::Kerberos::Client::TgsResponse do
subject do subject do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Kerberos::Client mod.extend ::Msf::Exploit::Remote::Kerberos::Client

View File

@ -8,7 +8,7 @@ def decompress(code)
Rex::Powershell::Script.new(code).decompress_code Rex::Powershell::Script.new(code).decompress_code
end end
describe Msf::Exploit::Powershell do RSpec.describe Msf::Exploit::Powershell do
subject do subject do
mod = Msf::Exploit.allocate mod = Msf::Exploit.allocate
mod.extend described_class mod.extend described_class

View File

@ -1,7 +1,7 @@
#require 'spec_helper' #require 'spec_helper'
require 'msf/core' require 'msf/core'
describe Msf::Exploit::Remote::BrowserExploitServer do RSpec.describe Msf::Exploit::Remote::BrowserExploitServer do
let(:in_memory_profile) do let(:in_memory_profile) do
{ {

View File

@ -1,6 +1,6 @@
require 'msf/core' require 'msf/core'
describe Msf::Exploit::Remote::BrowserProfileManager do RSpec.describe Msf::Exploit::Remote::BrowserProfileManager do
subject do subject do
mod = Msf::Exploit::Remote.allocate mod = Msf::Exploit::Remote.allocate

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'msf/core' require 'msf/core'
describe Msf::Exploit::Remote::FirefoxAddonGenerator do RSpec.describe Msf::Exploit::Remote::FirefoxAddonGenerator do
let(:datastore) { { 'TARGET' => 0 } } let(:datastore) { { 'TARGET' => 0 } }
let(:jar) { double(:pack => '@JAR@', :build_manifest => nil) } let(:jar) { double(:pack => '@JAR@', :build_manifest => nil) }
let(:payload) { double(:encoded => '@EXE@', :encoded_jar => jar) } let(:payload) { double(:encoded => '@EXE@', :encoded_jar => jar) }

View File

@ -1,7 +1,7 @@
require 'spec_helper' require 'spec_helper'
require 'msf/core' require 'msf/core'
describe Msf::Exploit::Remote::FirefoxPrivilegeEscalation do RSpec.describe Msf::Exploit::Remote::FirefoxPrivilegeEscalation do
it_should_behave_like 'Msf::Exploit::JSObfu' it_should_behave_like 'Msf::Exploit::JSObfu'

View File

@ -5,7 +5,7 @@ require 'rex/java/serialization'
require 'rex/proto/rmi' require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/builder' require 'msf/core/exploit/java/rmi/builder'
describe Msf::Exploit::Remote::Java::Rmi::Builder do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Builder do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Builder mod.extend ::Msf::Exploit::Remote::Java::Rmi::Builder

View File

@ -6,7 +6,7 @@ require 'rex/java/serialization'
require 'rex/proto/rmi' require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Connection::Builder do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Connection::Builder do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client

View File

@ -6,7 +6,7 @@ require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
require 'stringio' require 'stringio'
describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Connection do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Connection do
let(:name_get) { 'DefaultDomain:type=MLet' } let(:name_get) { 'DefaultDomain:type=MLet' }

View File

@ -6,7 +6,7 @@ require 'rex/java/serialization'
require 'rex/proto/rmi' require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Server::Builder do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Server::Builder do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client

View File

@ -5,7 +5,7 @@ require 'rex/java/serialization'
require 'rex/proto/rmi' require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Server::Parser do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Server::Parser do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client

View File

@ -6,7 +6,7 @@ require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
require 'stringio' require 'stringio'
describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Server do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client::Jmx::Server do
let(:new_client_response) do let(:new_client_response) do
"\x51\xac\xed\x00\x05\x77\x0f\x01\x82\x73\x92\x35\x00\x00\x01\x4c" + "\x51\xac\xed\x00\x05\x77\x0f\x01\x82\x73\x92\x35\x00\x00\x01\x4c" +

View File

@ -5,7 +5,7 @@ require 'rex/java/serialization'
require 'rex/proto/rmi' require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
describe ::Msf::Exploit::Remote::Java::Rmi::Client::Registry::Builder do RSpec.describe ::Msf::Exploit::Remote::Java::Rmi::Client::Registry::Builder do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client

View File

@ -5,7 +5,7 @@ require 'rex/java/serialization'
require 'rex/proto/rmi' require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
describe Msf::Exploit::Remote::Java::Rmi::Client::Registry::Parser do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client::Registry::Parser do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client

View File

@ -6,7 +6,7 @@ require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
require 'stringio' require 'stringio'
describe Msf::Exploit::Remote::Java::Rmi::Client::Registry do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client::Registry do
let(:list_with_names_response) do let(:list_with_names_response) do
"\x51\xac\xed\x00\x05\x77\x0f\x01\x82\x73\x92\x35\x00\x00\x01\x4c" + "\x51\xac\xed\x00\x05\x77\x0f\x01\x82\x73\x92\x35\x00\x00\x01\x4c" +

View File

@ -5,7 +5,7 @@ require 'rex/java/serialization'
require 'rex/proto/rmi' require 'rex/proto/rmi'
require 'msf/core/exploit/java/rmi/client' require 'msf/core/exploit/java/rmi/client'
describe Msf::Exploit::Remote::Java::Rmi::Client do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Client do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client mod.extend ::Msf::Exploit::Remote::Java::Rmi::Client

View File

@ -4,7 +4,7 @@ require 'spec_helper'
require 'rex/java/serialization' require 'rex/java/serialization'
require 'msf/core/exploit/java/rmi/util' require 'msf/core/exploit/java/rmi/util'
describe Msf::Exploit::Remote::Java::Rmi::Util do RSpec.describe Msf::Exploit::Remote::Java::Rmi::Util do
subject(:mod) do subject(:mod) do
mod = ::Msf::Exploit.new mod = ::Msf::Exploit.new
mod.extend ::Msf::Exploit::Remote::Java::Rmi::Util mod.extend ::Msf::Exploit::Remote::Java::Rmi::Util

View File

@ -5,7 +5,7 @@ require 'spec_helper'
require 'msf/core' require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -6,7 +6,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -5,7 +5,7 @@ require 'msf/core'
require 'msf/core/exploit/smb/server/share' require 'msf/core/exploit/smb/server/share'
require 'rex/proto/smb/constants' require 'rex/proto/smb/constants'
describe Msf::Exploit::Remote::SMB::Server::Share do RSpec.describe Msf::Exploit::Remote::SMB::Server::Share do
subject(:mod) do subject(:mod) do
mod = Msf::Exploit.new mod = Msf::Exploit.new

View File

@ -3,7 +3,7 @@
require 'spec_helper' require 'spec_helper'
require 'msf/core/framework' require 'msf/core/framework'
describe Msf::Framework do RSpec.describe Msf::Framework do
context '#initialize' do context '#initialize' do
subject(:framework) { subject(:framework) {
described_class.new described_class.new

View File

@ -1,6 +1,6 @@
require 'spec_helper' require 'spec_helper'
describe Msf::Module::Failure do RSpec.describe Msf::Module::Failure do
context 'CONSTANTS' do context 'CONSTANTS' do
context 'None' do context 'None' do
subject(:none) { subject(:none) {

View File

@ -16,7 +16,7 @@ require 'tmpdir'
require 'msf/core' require 'msf/core'
describe Msf::ModuleManager do RSpec.describe Msf::ModuleManager do
include_context 'Msf::Simple::Framework' include_context 'Msf::Simple::Framework'
let(:basename_prefix) do let(:basename_prefix) do

Some files were not shown because too many files have changed in this diff Show More