- DEFAULT_PORT =
'3790'
- DEFAULT_URI =
'/api/1.0'
- DEFAULT_SSL =
true
- DEFAULT_OS_FILTER =
false
- RUNNING_IMPORT_STATUS =
'running'
- EXPLOIT_RUNNING_MESSAGE =
'running'
- REQUIRED_TOKEN_MESSAGE =
'PWNED! Token is required'
- REQUIRED_CONNECTION_URL_MESSAGE =
'PWNED! Connection URL is required'
- REQUIRED_DEVICE_IP_TO_SCAN_MESSAGE =
'PWNED! Device IP to scan is required'
- USING_DEFAULT_PORT_MESSAGE =
'[*] No port specified in call, using 3790 as default'
- USING_DEFAULT_URI_MESSAGE =
'[*] No URI specified in call, using /api/1.0 as default'
- SUCCESSFUL_CONNECTION_MESSAGE =
'[*] Sucessfully authenticated to the Metasploit server'
- USING_DEFAULT_SSL_MESSAGE =
'[*] Using SSL=TRUE'
- IMPORTING_DATA_MESSAGE =
'[*] Importing scan data from Nexpose...'
- SCANNING_MESSAGE =
'[*] Scanning all your things with WebScan...'
- AUDIT_MESSAGE =
'[*] Performing web audit...'
- EXPLOIT_MESSAGE =
'[*] Exploiting all your things...'
- REPORT_MESSAGE =
'[*} Generating report...'
- REQUIRED_WORKSPACE_MESSAGE =
'PWNED! Workspace Name is required'
- SKIPPING_IMPORT_MESSAGE =
'[*] Nexpose Console option was not passed, skipping Nexpose Import'
- USING_OS_FILTER_MESSAGE =
'[*] The OS Filter is set to TRUE so we are limiting the modules to just the ones applicable to this Operating System'
- NO_OS_FILTER =
'[*] We did not receive an option for the OS Filter or you set it to FALSE, either way we are backing the truck up and using all modules'
- USING_MODULE_FILTER =
'[*] Filtering exploits based on your desired modules'
- NO_MODULE_FILTER =
'[*] Not filtering any modules'
- NO_REPORT_TYPE_MESSAGE =
'No report type specified - skipping report generation'