@@ -48,7 +48,6 @@ module Exploit::Remote::BrowserExploitServer
4848 :ua_name , # Example: MSIE
4949 :ua_ver , # Example: 8.0, 9.0
5050 :os_name , # Example: Windows 7, Linux
51- #:os_flavor, # Example: Home, Enterprise: (currently not implemented in os detection)
5251 :os_device , # Example: iPad, iPhone, etc
5352 :os_vendor , # Example: Microsoft, Ubuntu, Apple, etc
5453 :os_sp , # Example: SP2
@@ -214,8 +213,7 @@ def get_bad_requirements(profile)
214213 # Returns the target profile based on the tag. Each profile has the following structure:
215214 # 'cookie_name' =>
216215 # {
217- # :os_name => 'Windows 7',
218- # :os_flavor => 'Enterprise', # os_flavor is currently not implemented in os detection
216+ # :os_name => 'Windows 7'
219217 # ...... etc ......
220218 # }
221219 # A profile should at least have info about the following:
@@ -224,7 +222,6 @@ def get_bad_requirements(profile)
224222 # :ua_name : The name of the browser
225223 # :ua_ver : The version of the browser (not yet implemented)
226224 # :os_name : The name of the OS ("Windows XP")
227- # :os_flavor : The edition of the OS ("Home")
228225 # :language : The system's language
229226 # :arch : The system's arch
230227 # :proxy : Indicates whether proxy is used
0 commit comments