Advertisement
Guest User

Untitled

a guest
Jun 27th, 2017
62
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Ruby 0.90 KB | None | 0 0
  1.  
  2.     def initialize(info = {})
  3.         super(update_info(info,
  4.             'Name'           => 'Exploit Replay',
  5.             'Description'    => %q{
  6.                 Replays an attack recorded in the database as having opened a session.
  7.         Option values can be overwritten and search results can be narrowed
  8.         For now, only searches current workspace.
  9.             },
  10.             'License'        => BSD_LICENSE,
  11.             'Author'         =>  ['chao-mu'],
  12.             'References'     =>  [ ],
  13.             ))
  14.  
  15.         register_options([
  16.             OptBool.new('FIRST',[true, 'Use only the first exploit + options found', true])
  17.             OptBool.new('CHECK',[true, 'Run "check" before launching the attack', false])
  18.             OptString.new('CRITERIA', [true,  'Search criteria. "RHOST=127.0.0.1 RPORT=80"']),
  19.             OptString.new('OVERRIDES', [false,  'Override old values. "RPORT=8080"']),
  20.             OptAddressRange.new('RHOSTS', [false, "Address range or CIDR identifier. If set, exploits run as jobs"]),
  21.         ], self.class)
  22.     end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement