Updated How to write a browser exploit using BrowserExploitServer (markdown)
This commit is contained in:
@@ -90,11 +90,14 @@ The exact values available for :os_flavor:
|
||||
| WindowsVersions::EIGHT | "8" |
|
||||
|
||||
The exact values for :ua_name:
|
||||
* HttpClients::IE = "MSIE"
|
||||
* HttpClients::FF = "Firefox"
|
||||
* HttpClients::SAFARI = "Safari"
|
||||
* HttpClients::OPERA = "Opera"
|
||||
* HttpClients::CHROME = "Chrome"
|
||||
|
||||
| Constant | Value |
|
||||
| -------- | ----- |
|
||||
| HttpClients::IE | "MSIE" |
|
||||
| HttpClients::FF | "Firefox" |
|
||||
| HttpClients::SAFARI | "Safari" |
|
||||
| HttpClients::OPERA | "Opera" |
|
||||
| HttpClients::CHROME | "Chrome" |
|
||||
|
||||
More of these constants can be found here:
|
||||
https://github.com/rapid7/metasploit-framework/blob/master/lib/msf/core/constants.rb
|
||||
|
||||
Reference in New Issue
Block a user