# frozen_string_literal: true ## # This file is part of WhatWeb and may be subject to # redistribution and commercial restrictions. Please see the WhatWeb # web site for more information on licensing and terms of use. # http://www.morningstarsecurity.com/research/whatweb ## # Version 0.2 # 2016-04-23 # Andrew Horton # Moved HTTP Server pattern from passive function to matches[] ## WhatWeb::Plugin.define "Cimplicity-WebView" do @author = "Brendan Coles " # 2010-11-02 @version = "0.2" @description = "CIMPLICITY is a client/server based visualization and control solution that helps you visualize your operations, perform supervisory automation and deliver reliable information to higher-level analytic applications." @website = "http://www.ge-ip.com/products/2819" # ShodanHQ results as at 2010-11-02 # # 58 for CIMPLICITY-HttpSvr @matches = [ # Default Title { url: "/index.html", text: "CIMPLICITY WebView" }, # Default Applet HTML { text: '/).flatten } if target.body =~ // end m end # Aggressive # def aggressive(target) m = [] # Check HTTP Server if /^CIMPLICITY-HttpSvr\/([\d\.]+)/.match?(target.headers["server"]) url = URI.join(target.uri.to_s, "/index.html").to_s new_target = WhatWeb::Target.new(url) # Extract screen path # /index.html m << { string: new_target.body.scan(//).flatten } if body =~ // end m end end