Module: CONSTANTS

Defined in:
lib/metasploit/constants.rb

Constant Summary collapse

DEFAULT_PORT =
'3790'
DEFAULT_URI =
'/api/1.0'
DEFAULT_SSL =
true
DEFAULT_OS_FILTER =
false
RUNNING_IMPORT_STATUS =
'running'
EXPLOIT_RUNNING_MESSAGE =
'running'
REQUIRED_TOKEN_MESSAGE =
'PWNED! Token is required'
REQUIRED_CONNECTION_URL_MESSAGE =
'PWNED! Connection URL is required'
REQUIRED_DEVICE_IP_TO_SCAN_MESSAGE =
'PWNED! Device IP to scan is required'
USING_DEFAULT_PORT_MESSAGE =
'[*] No port specified in call, using 3790 as default'
USING_DEFAULT_URI_MESSAGE =
'[*] No URI specified in call, using /api/1.0 as default'
SUCCESSFUL_CONNECTION_MESSAGE =
'[*] Sucessfully authenticated to the Metasploit server'
USING_DEFAULT_SSL_MESSAGE =
'[*] Using SSL=TRUE'
IMPORTING_DATA_MESSAGE =
'[*] Importing scan data from Nexpose...'
SCANNING_MESSAGE =
'[*] Scanning all your things with WebScan...'
AUDIT_MESSAGE =
'[*] Performing web audit...'
EXPLOIT_MESSAGE =
'[*] Exploiting all your things...'
REPORT_MESSAGE =
'[*} Generating report...'
REQUIRED_WORKSPACE_MESSAGE =
'PWNED! Workspace Name is required'
SKIPPING_IMPORT_MESSAGE =
'[*] Nexpose Console option was not passed, skipping Nexpose Import'
USING_OS_FILTER_MESSAGE =
'[*] The OS Filter is set to TRUE so we are limiting the modules to just the ones applicable to this Operating System'
NO_OS_FILTER =
'[*] We did not receive an option for the OS Filter or you set it to FALSE, either way we are backing the truck up and using all modules'
USING_MODULE_FILTER =
'[*] Filtering exploits based on your desired modules'
NO_MODULE_FILTER =
'[*] Not filtering any modules'
NO_REPORT_TYPE_MESSAGE =
'No report type specified - skipping report generation'