@@ -48,7 +48,6 @@ module Exploit::Remote::BrowserExploitServer
48
48
:ua_name , # Example: MSIE
49
49
:ua_ver , # Example: 8.0, 9.0
50
50
:os_name , # Example: Windows 7, Linux
51
- #:os_flavor, # Example: Home, Enterprise: (currently not implemented in os detection)
52
51
:os_device , # Example: iPad, iPhone, etc
53
52
:os_vendor , # Example: Microsoft, Ubuntu, Apple, etc
54
53
:os_sp , # Example: SP2
@@ -214,8 +213,7 @@ def get_bad_requirements(profile)
214
213
# Returns the target profile based on the tag. Each profile has the following structure:
215
214
# 'cookie_name' =>
216
215
# {
217
- # :os_name => 'Windows 7',
218
- # :os_flavor => 'Enterprise', # os_flavor is currently not implemented in os detection
216
+ # :os_name => 'Windows 7'
219
217
# ...... etc ......
220
218
# }
221
219
# A profile should at least have info about the following:
@@ -224,7 +222,6 @@ def get_bad_requirements(profile)
224
222
# :ua_name : The name of the browser
225
223
# :ua_ver : The version of the browser (not yet implemented)
226
224
# :os_name : The name of the OS ("Windows XP")
227
- # :os_flavor : The edition of the OS ("Home")
228
225
# :language : The system's language
229
226
# :arch : The system's arch
230
227
# :proxy : Indicates whether proxy is used
0 commit comments