@@ -41,15 +41,6 @@ def initialize(info = {})
41
41
OptInt . new ( 'device' , [ true , 'ID of device from list of vulnerable devices' ] )
42
42
] , Exploit ::Remote ::HttpClient
43
43
)
44
-
45
- register_advanced_options (
46
- [
47
- #OptString.new('COOKIE_NUMBER',[false, 'Value used in cookie e.g. 107373883']),
48
- #OptInt.new('COOKIE_OFFSET',[false, 'Value of offset in cookie']),
49
- OptString . new ( 'CANARY_URI' , [ false , 'Try overwriting the requested URI with this canary value (empty for random)' ] ) ,
50
- OptString . new ( 'STATUS_CODES_REGEX' , [ true , 'Ensure that canary pages and probe responses have status codes that match this regex' , '^40[134]$' ] )
51
- ] , self . class
52
- )
53
44
end
54
45
55
46
def headers
@@ -58,6 +49,7 @@ def headers
58
49
}
59
50
end
60
51
52
+ # List of known values and models, couldn't find better solution how to store them
61
53
def devices_list
62
54
[
63
55
{ :name => 'Azmoon' , :model => 'AZ-D140W' , :fw => '2.11.89.0(RE2.C29)3.11.11.52_PMOFF.1' , :number => 107367693 ,
@@ -238,6 +230,7 @@ def auxiliary_commands
238
230
{ "devices" => "List known vulnerable devices" }
239
231
end
240
232
233
+ # Command for listing all devivces with known values, for bypass to work
241
234
def cmd_devices ( *args )
242
235
tbl = Msf ::Ui ::Console ::Table . new (
243
236
Msf ::Ui ::Console ::Table ::Style ::Default ,
@@ -259,12 +252,6 @@ def cmd_devices(*args)
259
252
counter += 1
260
253
end
261
254
print tbl . to_s
262
- #print_status("ID\tName")
263
-
264
- #for device in devices_list
265
- # print_status(counter.to_s + ":\t" + device[:name])
266
- # counter += 1
267
- #end
268
255
end
269
256
270
257
def run
0 commit comments