Sha256: 4c61809dcaae1a91f22ebf1882b67652265d68ca380544d3635ab5c0bf91fe83
Contents?: true
Size: 1.33 KB
Versions: 23
Compression:
Stored size: 1.33 KB
Contents
# An asychronous callback that has been received by the Mettle Pingback Listener and is logged class Mdm::AsyncCallback < ApplicationRecord extend ActiveSupport::Autoload include Metasploit::Model::Search # # Associations # # # Attributes # # @!attribute [rw] uuid # A 16-byte unique identifier for this payload. The UUID is encoded to include specific information. # See lib/msf/core/payload/uuid.rb in the https://github.com/rapid7/metasploit-framework repo. # # @return [String] # @!attribute [rw] timestamp # The Unix format timestamp when this payload called back. # # @return [Integer] # @!attribute [rw] listener_uri # Non-unique URIs (eg. "tcp://192.168.1.7:4444") which received callbacks from this payload. # # @return [String] # @!attribute [rw] target_host # The IP address (eg. "192.168.1.7" or "fe80::1") from which the callback originated, from the view of the callback listener. # # @return [String] # @!attribute [rw] target_port # The IP port (eg. "4444") from which the callback originated, from the view of the callback listener. # # @return [Integer] # # Validations # # # Search Attributes # search_attribute :uuid, type: :string # # Serializations # # NONE public Metasploit::Concern.run(self) end
Version data entries
23 entries across 23 versions & 2 rubygems