metasploit-framework

https://github.com/rapid7/metasploit-framework

Ruby

Metasploit Framework

Msf::Exploit::Remote::HttpClient#lookup_http_fingerprints

Lookup HTTP fingerprints from the database that match the current
destination host and port. This method falls back to using the old
service.info field to represent the HTTP Server header.

Source | Google | Stack overflow

Edit

git clone [email protected]:rapid7/metasploit-framework.git

cd metasploit-framework

open lib/msf/core/exploit/http/client.rb

Contribute

# Make a new branch

git checkout -b -your-name--update-docs-Msf--Exploit--Remote--HttpClient-lookup_http_fingerprints-for-pr


# Commit to git

git add lib/msf/core/exploit/http/client.rbgit commit -m "better docs for Msf::Exploit::Remote::HttpClient#lookup_http_fingerprints"


# Open pull request

gem install hub # on a mac you can `brew install hub`

hub fork

git push <your name> -your-name--update-docs-Msf--Exploit--Remote--HttpClient-lookup_http_fingerprints-for-pr

hub pull-request


# Celebrate!