Updated How to write a browser exploit using BrowserExploitServer (markdown)

This commit is contained in:
wchen-r7
2014-10-03 23:50:48 -07:00
parent ac06e40822
commit e89f0ac5ae
@@ -90,11 +90,14 @@ The exact values available for :os_flavor:
| WindowsVersions::EIGHT | "8" |
The exact values for :ua_name:
* HttpClients::IE = "MSIE"
* HttpClients::FF = "Firefox"
* HttpClients::SAFARI = "Safari"
* HttpClients::OPERA = "Opera"
* HttpClients::CHROME = "Chrome"
| Constant | Value |
| -------- | ----- |
| HttpClients::IE | "MSIE" |
| HttpClients::FF | "Firefox" |
| HttpClients::SAFARI | "Safari" |
| HttpClients::OPERA | "Opera" |
| HttpClients::CHROME | "Chrome" |
More of these constants can be found here:
https://github.com/rapid7/metasploit-framework/blob/master/lib/msf/core/constants.rb