mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
remove unused files
git-svn-id: file:///home/svn/incoming/trunk@3181 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
1abeda6abd
commit
d61fa863a9
@ -2,7 +2,6 @@ require 'rex/proto/http'
|
||||
require 'msf/core'
|
||||
require 'msf/base'
|
||||
require 'msf/ui'
|
||||
require 'msf/ui/web/request_dispatcher'
|
||||
|
||||
module Msf
|
||||
module Ui
|
||||
@ -16,8 +15,6 @@ module Web
|
||||
###
|
||||
class Driver < Msf::Ui::Driver
|
||||
|
||||
include RequestDispatcher
|
||||
|
||||
ConfigCore = "framework/core"
|
||||
ConfigGroup = "framework/ui/web"
|
||||
|
||||
|
@ -1,108 +0,0 @@
|
||||
module Msf
|
||||
module Ui
|
||||
module Web
|
||||
|
||||
###
|
||||
#
|
||||
# This module takes a web request and processes it.
|
||||
#
|
||||
###
|
||||
module RequestDispatcher
|
||||
|
||||
#
|
||||
# Dispatch the supplied request.
|
||||
#
|
||||
def dispatch_request(cli, req)
|
||||
qstring = req.qstring || {}
|
||||
|
||||
dlog("#{cli.peerhost}: Processing request cat=#{qstring['cat']} m=#{qstring['m']}.",
|
||||
LogSource)
|
||||
|
||||
case qstring['cat']
|
||||
when "e" # exploits
|
||||
dispatch_exploit_req(cli, req, qstring)
|
||||
when "p" # payloads
|
||||
dispatch_payload_req(cli, req, qstring)
|
||||
when "s" # sessions
|
||||
dispatch_session_req(cli, req, qstring)
|
||||
end
|
||||
end
|
||||
|
||||
##
|
||||
#
|
||||
# Exploit-related request dispatching.
|
||||
#
|
||||
##
|
||||
|
||||
#
|
||||
# Dispatch an exploit request based on the particular method that was
|
||||
# specified.
|
||||
#
|
||||
def dispatch_exploit_req(cli, req, qstring)
|
||||
case qstring['m']
|
||||
when "lst"
|
||||
send_exploit_list(cli, req, qstring)
|
||||
end
|
||||
end
|
||||
|
||||
#
|
||||
# Transmits the exploit list to the client.
|
||||
#
|
||||
def send_exploit_list(cli, req, qstring)
|
||||
body = "<html><table border='1'>"
|
||||
|
||||
framework.exploits.each_module { |name, mod|
|
||||
inst = mod.new
|
||||
|
||||
body += "<tr><td>#{name}</td><td>#{inst.name}</td></tr>"
|
||||
}
|
||||
|
||||
body += "</table></html>"
|
||||
|
||||
send_ok(cli, body)
|
||||
end
|
||||
|
||||
##
|
||||
#
|
||||
# Payload-related request dispatching.
|
||||
#
|
||||
##
|
||||
|
||||
#
|
||||
# Dispatch a payload request based on the particular method that was
|
||||
# specified.
|
||||
#
|
||||
def dispatch_payload_req(cli, req, qstring)
|
||||
end
|
||||
|
||||
##
|
||||
#
|
||||
# Session-related request dispatching.
|
||||
#
|
||||
##
|
||||
|
||||
#
|
||||
# Dispatch a session request based on the particular method that was
|
||||
# specified.
|
||||
#
|
||||
def dispatch_session_req(cli, req, qstring)
|
||||
end
|
||||
|
||||
protected
|
||||
|
||||
#
|
||||
# Transmits the supplied body in a 200/OK response to the client.
|
||||
#
|
||||
def send_ok(cli, body)
|
||||
resp = Rex::Proto::Http::Response::OK.new
|
||||
|
||||
resp.body = body
|
||||
|
||||
cli.send_response(resp)
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
end
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue
Block a user