metasploit-runner 0.1.4 → 0.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 35f5214110b45ee7737150e8e2b8f309c94929f3
4
- data.tar.gz: 5207c3a1e4a967a499c3ea23224b3636bb026e94
3
+ metadata.gz: 4bb75550e85c0732ecd62feb3eb1c8c149f5f7a3
4
+ data.tar.gz: 9ca0b010c3becf3364811bdafe0cb1498fcb0175
5
5
  SHA512:
6
- metadata.gz: f575ec3f47557b826a6f094356b25aa7a604d3c3dc4b8f1ea207ba78c3fad7633c6d000d49e081b8eaeed9b3ca04d8e585d04f3a96e813b669b3fe0d3ebac560
7
- data.tar.gz: e6f4e1c1dd9ba9ae9b40ba70b7e85f669385fc2490d86a7b22c275199bb68b93e4a447ea4236da8c4ab6c1f8414a426212ab77e7a56bc323e29fc8dbe06d73d7
6
+ metadata.gz: c2f222fa88b8fb2ae7805ef8c4fa8d97811b355e1a61b70944ffa4fc7fc802627974adf58bb5f431c1ebe064c077ea04e168ee1ef31c80fa3dbdca029e59e654
7
+ data.tar.gz: c4726d89905d7a30a0725d79e17c2f88db1ef24d318265a5dfefb6685621174a69472a923d6b752b3e7eeb14fd83fe559e1b976efdf99712dfdbe0e7b26e627f
@@ -1,3 +1,3 @@
1
1
  module MetasploitPenTestScript
2
- VERSION = "0.1.4"
2
+ VERSION = "0.1.6"
3
3
  end
@@ -30,7 +30,9 @@ class ExploitRunDescription
30
30
  :port => self.port,
31
31
  :token => self.token,
32
32
  :uri => self.uri,
33
- :ssl => self.use_ssl}
33
+ :ssl => self.use_ssl,
34
+ :ssl_version => 'TLS1'
35
+ }
34
36
  end
35
37
 
36
38
  def device_ip_to_scan=(value)
@@ -13,6 +13,7 @@ describe 'exploit_run_description' do
13
13
  @expected_nexpose_console_name = 'nexpose_console_name'
14
14
  @expected_webscan_task_id = '12'
15
15
  @expected_import_task_id = '1'
16
+ @expected_tls ='TLS1'
16
17
  @mock_rpc_client = get_mock_rpc_client
17
18
  @mock_device_ip_to_scan = '127.0.0.1'
18
19
  @mock_device_url_to_scan = "http://#{@mock_device_ip_to_scan}"
@@ -117,7 +118,8 @@ describe 'exploit_run_description' do
117
118
  :port => @expected_port,
118
119
  :token => @expected_token,
119
120
  :uri => @expected_uri,
120
- :ssl => @expected_ssl})
121
+ :ssl => @expected_ssl,
122
+ :ssl_version => @expected_tls})
121
123
  end
122
124
 
123
125
  it 'should be using the correct methods to fill the options' do
@@ -126,7 +128,8 @@ describe 'exploit_run_description' do
126
128
  :port => CONSTANTS::DEFAULT_PORT,
127
129
  :token => @expected_token,
128
130
  :uri => @expected_uri,
129
- :ssl => @expected_ssl})
131
+ :ssl => @expected_ssl,
132
+ :ssl_version => @expected_tls})
130
133
  end
131
134
  end
132
135
 
data/spec/exploit_spec.rb CHANGED
@@ -30,6 +30,7 @@ describe 'exploit' do
30
30
  @expected_session_limit = true
31
31
  @expected_match_vulns = true
32
32
  @expected_match_ports = true
33
+ @expected_ssl_version ='TLS1'
33
34
  @mock_rpc_client = get_mock_rpc_client
34
35
  @mock_device_ip_to_scan = '127.0.0.1'
35
36
  @mock_device_url_to_scan = "http://#{@mock_device_ip_to_scan}"
@@ -403,7 +404,7 @@ describe 'exploit' do
403
404
  end
404
405
 
405
406
  def get_default_options_and_override(override)
406
- {:host => @expected_connection, :port => @expected_port, :token => @expected_token, :uri => @expected_uri, :ssl => @expected_ssl}.merge(override)
407
+ {:host => @expected_connection, :port => @expected_port, :token => @expected_token, :uri => @expected_uri, :ssl => @expected_ssl, :ssl_version => @expected_ssl_version}.merge(override)
407
408
  end
408
409
 
409
410
  def get_mock_rpc_client
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-runner
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.4
4
+ version: 0.1.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Nathan Gibson
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-12-04 00:00:00.000000000 Z
11
+ date: 2014-12-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: msfrpc-client