@@ -48,7 +48,6 @@ module Exploit::Remote::BrowserExploitServer
48
48
:ua_name , # Example: MSIE
49
49
:ua_ver , # Example: 8.0, 9.0
50
50
:os_name , # Example: Windows 7, Linux
51
- :os_flavor , # Example: Home, Enterprise
52
51
:os_device , # Example: iPad, iPhone, etc
53
52
:os_vendor , # Example: Microsoft, Ubuntu, Apple, etc
54
53
:os_sp , # Example: SP2
@@ -214,17 +213,15 @@ def get_bad_requirements(profile)
214
213
# Returns the target profile based on the tag. Each profile has the following structure:
215
214
# 'cookie_name' =>
216
215
# {
217
- # :os_name => 'Windows 7',
218
- # :os_flavor => 'Enterprise',
216
+ # :os_name => 'Windows 7'
219
217
# ...... etc ......
220
218
# }
221
219
# A profile should at least have info about the following:
222
220
# :source : The data source. Either from 'script', or 'headers'. The 'script' source
223
221
# should be more accurate in some scenarios like browser compatibility mode
224
222
# :ua_name : The name of the browser
225
- # :ua_ver : The version of the browser
223
+ # :ua_ver : The version of the browser (not yet implemented)
226
224
# :os_name : The name of the OS ("Windows XP")
227
- # :os_flavor : The edition of the OS ("Home")
228
225
# :language : The system's language
229
226
# :arch : The system's arch
230
227
# :proxy : Indicates whether proxy is used
@@ -383,7 +380,6 @@ def get_detection_html(user_agent)
383
380
var osInfo = os_detect.getVersion();
384
381
var d = {
385
382
"os_name" : osInfo.os_name,
386
- "os_flavor" : osInfo.os_flavor,
387
383
"os_vendor" : osInfo.os_vendor,
388
384
"os_device" : osInfo.os_device,
389
385
"ua_name" : osInfo.ua_name,
0 commit comments