@@ -48,7 +48,7 @@ module Exploit::Remote::BrowserExploitServer
48
48
:ua_name , # Example: MSIE
49
49
:ua_ver , # Example: 8.0, 9.0
50
50
:os_name , # Example: Windows 7, Linux
51
- :os_flavor , # Example: Home, Enterprise
51
+ # :os_flavor, # Example: Home, Enterprise: (currently not implemented in os detection)
52
52
:os_device , # Example: iPad, iPhone, etc
53
53
:os_vendor , # Example: Microsoft, Ubuntu, Apple, etc
54
54
:os_sp , # Example: SP2
@@ -215,14 +215,14 @@ def get_bad_requirements(profile)
215
215
# 'cookie_name' =>
216
216
# {
217
217
# :os_name => 'Windows 7',
218
- # :os_flavor => 'Enterprise',
218
+ # :os_flavor => 'Enterprise', # os_flavor is currently not implemented in os detection
219
219
# ...... etc ......
220
220
# }
221
221
# A profile should at least have info about the following:
222
222
# :source : The data source. Either from 'script', or 'headers'. The 'script' source
223
223
# should be more accurate in some scenarios like browser compatibility mode
224
224
# :ua_name : The name of the browser
225
- # :ua_ver : The version of the browser
225
+ # :ua_ver : The version of the browser (not yet implemented)
226
226
# :os_name : The name of the OS ("Windows XP")
227
227
# :os_flavor : The edition of the OS ("Home")
228
228
# :language : The system's language
@@ -383,7 +383,6 @@ def get_detection_html(user_agent)
383
383
var osInfo = os_detect.getVersion();
384
384
var d = {
385
385
"os_name" : osInfo.os_name,
386
- "os_flavor" : osInfo.os_flavor,
387
386
"os_vendor" : osInfo.os_vendor,
388
387
"os_device" : osInfo.os_device,
389
388
"ua_name" : osInfo.ua_name,
0 commit comments