metasploit-framework

https://github.com/rapid7/metasploit-framework

Ruby

Metasploit Framework

Msf::Exploit::Remote::HttpServer#fingerprint_user_agent

Return a Hash containing a best guess at the actual browser and operating
system versions, based on the User-Agent header.

Keys in the returned hash are similar to those expected of
Report#report_client, and Msf::DBManager#report_host namely:
+:ua_name+::     a brief identifier for the client, e.g. "Firefox"
+:ua_ver+::      the version number of the client, e.g. "3.0.11"
+:os_name+::     something like "Windows XP", "Windows 7", or "Linux"
+:os_flavor+::   something like "Enterprise", "Pro", or "Home"
+:os_lang+::     something like "English", "French", or "en-US"
+:arch+::        one of the ARCH_* constants

Unknown values may be nil.

Source | Google | Stack overflow

Edit

git clone [email protected]:rapid7/metasploit-framework.git

cd metasploit-framework

open lib/msf/core/exploit/http/server.rb

Contribute

# Make a new branch

git checkout -b -your-name--update-docs-Msf--Exploit--Remote--HttpServer-fingerprint_user_agent-for-pr


# Commit to git

git add lib/msf/core/exploit/http/server.rbgit commit -m "better docs for Msf::Exploit::Remote::HttpServer#fingerprint_user_agent"


# Open pull request

gem install hub # on a mac you can `brew install hub`

hub fork

git push <your name> -your-name--update-docs-Msf--Exploit--Remote--HttpServer-fingerprint_user_agent-for-pr

hub pull-request


# Celebrate!