metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Msf::Exploit::Remote::HttpClient#lookup_http_fingerprints
Lookup HTTP fingerprints from the database that match the current destination host and port. This method falls back to using the old service.info field to represent the HTTP Server header.
Edit
git clone [email protected]:rapid7/metasploit-framework.git
cd metasploit-framework
open lib/msf/core/exploit/http/client.rb
Contribute
# Make a new branchgit checkout -b -your-name--update-docs-Msf--Exploit--Remote--HttpClient-lookup_http_fingerprints-for-pr
# Commit to gitgit add lib/msf/core/exploit/http/client.rbgit commit -m "better docs for Msf::Exploit::Remote::HttpClient#lookup_http_fingerprints"
# Open pull requestgem install hub # on a mac you can `brew install hub`
hub fork
git push <your name> -your-name--update-docs-Msf--Exploit--Remote--HttpClient-lookup_http_fingerprints-for-pr
hub pull-request
# Celebrate!