metasploit-framework/lib/msf/core/handler
Pedro Laguna 70d1eefaa9 Update reverse_tcp.rb
As I am using a exploit that does a check on the Server HTTP headers to identify the target I saw an error message that reads like this:

>The target server fingerprint "" does not match "(?-mix:(Jetty|JBoss))", use 'set FingerprintCheck false' to disable this check.

Then, while using a HTTP proxy to analyse the requests I am presented with an error that tells me to set another internal option to override a default behaviour. Although it should be pretty clear to everyone using the metasploit framework, I think it is more convenient if all error messages have the same format/way to present suggestions, in this case, presenting the full command the user needs to introduce in order to carry on with the execution of the exploit.
2014-10-14 11:24:59 +01:00
..
reverse_http Add 'coding: binary' to all msf/rex library files 2014-08-17 17:31:53 -05:00
bind_tcp.rb Update bind_tcp.rb 2014-01-07 22:02:52 +01:00
find_port.rb Retab lib 2013-08-30 16:28:33 -05:00
find_shell.rb Retab lib 2013-08-30 16:28:33 -05:00
find_tag.rb Retab lib 2013-08-30 16:28:33 -05:00
find_tty.rb Retab lib 2013-08-30 16:28:33 -05:00
none.rb Retab lib 2013-08-30 16:28:33 -05:00
reverse_hop_http.rb Added bundling to handle many sessions at once. 2014-02-15 15:37:22 -06:00
reverse_http.rb Remove superfluous v6 http{,s} payload and handler 2014-04-16 18:32:35 -05:00
reverse_https.rb Retab lib 2013-08-30 16:28:33 -05:00
reverse_https_proxy.rb Update reverse_https_proxy stager/handler 2013-11-11 22:21:05 +10:00
reverse_tcp.rb Update reverse_tcp.rb 2014-10-14 11:24:59 +01:00
reverse_tcp_allports.rb Retab lib 2013-08-30 16:28:33 -05:00
reverse_tcp_double.rb Remove redundant option (threads are always used in reverse_tcp_double) 2014-06-22 16:00:44 -05:00
reverse_tcp_double_ssl.rb Prevent stager deadlock if inp/out detection hangs for some reason 2014-06-22 15:25:19 -05:00
reverse_tcp_ssl.rb Add 'coding: binary' to all msf/rex library files 2014-08-17 17:31:53 -05:00