Class: Rex::Proto::Http::Client
- Inherits:
-
Object
- Object
- Rex::Proto::Http::Client
- Defined in:
- lib/rex/proto/http/client.rb
Overview
Acts as a client to an HTTP server, sending requests and receiving responses.
See the RFC: www.w3.org/Protocols/rfc2616/rfc2616.html
Instance Attribute Summary collapse
-
#comm ⇒ Object
An optional comm to use for creating the underlying socket.
-
#config ⇒ Object
The client request configuration.
-
#config_types ⇒ Object
The client request configuration classes.
-
#conn ⇒ Object
The underlying connection.
-
#context ⇒ Object
The calling context to pass to the socket.
-
#hostname ⇒ Object
protected
:nodoc:.
-
#junk_pipeline ⇒ Object
When parsing the request, thunk off the first response from the server, since junk.
-
#kerberos_authenticator ⇒ Object
Auth.
-
#krb_encryptor ⇒ Object
protected
The established kerberos connection info.
-
#local_host ⇒ Object
The local host of the client.
-
#local_port ⇒ Object
The local port of the client.
-
#ntlm_client ⇒ Object
protected
The established NTLM connection info.
-
#password ⇒ Object
Auth.
-
#pipeline ⇒ Object
Whether or not pipelining is in use.
-
#port ⇒ Object
protected
:nodoc:.
-
#proxies ⇒ Object
The proxy list.
-
#ssl ⇒ Object
protected
https.
-
#ssl_version ⇒ Object
protected
https.
-
#subscriber ⇒ Rex::Proto::Http::HttpSubscriber
The HTTP subscriber.
-
#username ⇒ Object
Auth.
Instance Method Summary collapse
-
#_send_recv(req, t = -1,, persist = false) ⇒ Response
Transmit an HTTP request and receive the response.
-
#basic_auth_header(username, password) ⇒ String
Converts username and password into the HTTP Basic authorization string.
- #channel_binding ⇒ Object
-
#close ⇒ Object
Closes the connection to the remote server.
-
#conn? ⇒ Boolean
Returns whether or not the conn is valid.
-
#connect(t = -1)) ⇒ Rex::Socket::Tcp
Connects to the remote server if possible.
-
#digest_auth(opts = {}) ⇒ Response
Send a series of requests to complete Digest Authentication.
-
#initialize(host, port = 80, context = {}, ssl = nil, ssl_version = nil, proxies = nil, username = '', password = '', kerberos_authenticator: nil, comm: nil, subscriber: nil) ⇒ Client
constructor
Creates a new client instance.
- #kerberos_auth(opts = {}) ⇒ Object
-
#negotiate_auth(opts = {}) ⇒ Response
Builds a series of requests to complete Negotiate Auth.
-
#peerinfo ⇒ Object
Target host addr and port for this connection.
-
#pipelining? ⇒ Boolean
Whether or not connections should be pipelined.
-
#read_response(t = -1,, opts = {}) ⇒ Response
Read a response from the server.
-
#request_cgi(opts = {}) ⇒ ClientRequest
Create a CGI compatible request.
-
#request_raw(opts = {}) ⇒ ClientRequest
Create an arbitrary HTTP request.
-
#send_auth(res, opts, t, persist) ⇒ Response
Resends an HTTP Request with the proper authentication headers set.
-
#send_recv(req, t = -1,, persist = false) ⇒ Response
Sends a request and gets a response back.
-
#send_request(req, t = -1)) ⇒ void
Send an HTTP request to the server.
-
#set_config(opts = {}) ⇒ Object
Set configuration options.
-
#stop ⇒ Object
Cleans up any outstanding connections and other resources.
Constructor Details
#initialize(host, port = 80, context = {}, ssl = nil, ssl_version = nil, proxies = nil, username = '', password = '', kerberos_authenticator: nil, comm: nil, subscriber: nil) ⇒ Client
Creates a new client instance
25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 |
# File 'lib/rex/proto/http/client.rb', line 25 def initialize(host, port = 80, context = {}, ssl = nil, ssl_version = nil, proxies = nil, username = '', password = '', kerberos_authenticator: nil, comm: nil, subscriber: nil) self.hostname = host self.port = port.to_i self.context = context self.ssl = ssl self.ssl_version = ssl_version self.proxies = proxies self.username = username self.password = password self.kerberos_authenticator = kerberos_authenticator self.comm = comm self.subscriber = subscriber || HttpSubscriber.new # Take ClientRequest's defaults, but override with our own self.config = Http::ClientRequest::DefaultConfig.merge({ 'read_max_data' => (1024 * 1024 * 1), 'vhost' => hostname, 'ssl_server_name_indication' => hostname }) config['agent'] ||= Rex::UserAgent.session_agent # XXX: This info should all be controlled by ClientRequest self.config_types = { 'uri_encode_mode' => ['hex-normal', 'hex-all', 'hex-random', 'hex-noslashes', 'u-normal', 'u-random', 'u-all'], 'uri_encode_count' => 'integer', 'uri_full_url' => 'bool', 'pad_method_uri_count' => 'integer', 'pad_uri_version_count' => 'integer', 'pad_method_uri_type' => ['space', 'tab', 'apache'], 'pad_uri_version_type' => ['space', 'tab', 'apache'], 'method_random_valid' => 'bool', 'method_random_invalid' => 'bool', 'method_random_case' => 'bool', 'version_random_valid' => 'bool', 'version_random_invalid' => 'bool', 'uri_dir_self_reference' => 'bool', 'uri_dir_fake_relative' => 'bool', 'uri_use_backslashes' => 'bool', 'pad_fake_headers' => 'bool', 'pad_fake_headers_count' => 'integer', 'pad_get_params' => 'bool', 'pad_get_params_count' => 'integer', 'pad_post_params' => 'bool', 'pad_post_params_count' => 'integer', 'shuffle_get_params' => 'bool', 'shuffle_post_params' => 'bool', 'uri_fake_end' => 'bool', 'uri_fake_params_start' => 'bool', 'header_folding' => 'bool', 'chunked_size' => 'integer', 'partial' => 'bool' } end |
Instance Attribute Details
#comm ⇒ Object
An optional comm to use for creating the underlying socket.
682 683 684 |
# File 'lib/rex/proto/http/client.rb', line 682 def comm @comm end |
#config ⇒ Object
The client request configuration
686 687 688 |
# File 'lib/rex/proto/http/client.rb', line 686 def config @config end |
#config_types ⇒ Object
The client request configuration classes
690 691 692 |
# File 'lib/rex/proto/http/client.rb', line 690 def config_types @config_types end |
#conn ⇒ Object
The underlying connection.
706 707 708 |
# File 'lib/rex/proto/http/client.rb', line 706 def conn @conn end |
#context ⇒ Object
The calling context to pass to the socket
710 711 712 |
# File 'lib/rex/proto/http/client.rb', line 710 def context @context end |
#hostname ⇒ Object (protected)
:nodoc:
730 731 732 |
# File 'lib/rex/proto/http/client.rb', line 730 def hostname @hostname end |
#junk_pipeline ⇒ Object
When parsing the request, thunk off the first response from the server, since junk
720 721 722 |
# File 'lib/rex/proto/http/client.rb', line 720 def junk_pipeline @junk_pipeline end |
#kerberos_authenticator ⇒ Object
Auth
717 718 719 |
# File 'lib/rex/proto/http/client.rb', line 717 def kerberos_authenticator @kerberos_authenticator end |
#krb_encryptor ⇒ Object (protected)
The established kerberos connection info
740 741 742 |
# File 'lib/rex/proto/http/client.rb', line 740 def krb_encryptor @krb_encryptor end |
#local_host ⇒ Object
The local host of the client.
698 699 700 |
# File 'lib/rex/proto/http/client.rb', line 698 def local_host @local_host end |
#local_port ⇒ Object
The local port of the client.
702 703 704 |
# File 'lib/rex/proto/http/client.rb', line 702 def local_port @local_port end |
#ntlm_client ⇒ Object (protected)
The established NTLM connection info
735 736 737 |
# File 'lib/rex/proto/http/client.rb', line 735 def ntlm_client @ntlm_client end |
#password ⇒ Object
Auth
717 718 719 |
# File 'lib/rex/proto/http/client.rb', line 717 def password @password end |
#pipeline ⇒ Object
Whether or not pipelining is in use.
694 695 696 |
# File 'lib/rex/proto/http/client.rb', line 694 def pipeline @pipeline end |
#port ⇒ Object (protected)
:nodoc:
730 731 732 |
# File 'lib/rex/proto/http/client.rb', line 730 def port @port end |
#proxies ⇒ Object
The proxy list
714 715 716 |
# File 'lib/rex/proto/http/client.rb', line 714 def proxies @proxies end |
#ssl ⇒ Object (protected)
https
728 729 730 |
# File 'lib/rex/proto/http/client.rb', line 728 def ssl @ssl end |
#ssl_version ⇒ Object (protected)
https
728 729 730 |
# File 'lib/rex/proto/http/client.rb', line 728 def ssl_version @ssl_version end |
#subscriber ⇒ Rex::Proto::Http::HttpSubscriber
Returns The HTTP subscriber.
723 724 725 |
# File 'lib/rex/proto/http/client.rb', line 723 def subscriber @subscriber end |
#username ⇒ Object
Auth
717 718 719 |
# File 'lib/rex/proto/http/client.rb', line 717 def username @username end |
Instance Method Details
#_send_recv(req, t = -1,, persist = false) ⇒ Response
Transmit an HTTP request and receive the response
If persist is set, then the request will attempt to reuse an existing connection.
Call this directly instead of #send_recv if you don’t want automatic authentication handling.
230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 |
# File 'lib/rex/proto/http/client.rb', line 230 def _send_recv(req, t = -1, persist = false) @pipeline = persist subscriber.on_request(req) if req.respond_to?(:opts) && req.opts['ntlm_transform_request'] && ntlm_client req = req.opts['ntlm_transform_request'].call(ntlm_client, req) elsif req.respond_to?(:opts) && req.opts['krb_transform_request'] && krb_encryptor req = req.opts['krb_transform_request'].call(krb_encryptor, req) end send_request(req, t) res = read_response(t, original_request: req) if req.respond_to?(:opts) && req.opts['ntlm_transform_response'] && ntlm_client req.opts['ntlm_transform_response'].call(ntlm_client, res) elsif req.respond_to?(:opts) && req.opts['krb_transform_response'] && krb_encryptor req = req.opts['krb_transform_response'].call(krb_encryptor, res) end res.request = req.to_s if res res.peerinfo = peerinfo if res subscriber.on_response(res) res end |
#basic_auth_header(username, password) ⇒ String
Converts username and password into the HTTP Basic authorization string.
338 339 340 341 |
# File 'lib/rex/proto/http/client.rb', line 338 def basic_auth_header(username, password) auth_str = username.to_s + ':' + password.to_s 'Basic ' + Rex::Text.encode_base64(auth_str) end |
#channel_binding ⇒ Object
540 541 542 543 544 545 546 |
# File 'lib/rex/proto/http/client.rb', line 540 def channel_binding if !conn.respond_to?(:peer_cert) or conn.peer_cert.nil? nil else Net::NTLM::ChannelBinding.create(OpenSSL::X509::Certificate.new(conn.peer_cert)) end end |
#close ⇒ Object
Closes the connection to the remote server.
195 196 197 198 199 200 201 202 203 |
# File 'lib/rex/proto/http/client.rb', line 195 def close if conn && !conn.closed? conn.shutdown conn.close end self.conn = nil self.ntlm_client = nil end |
#conn? ⇒ Boolean
Returns whether or not the conn is valid.
652 653 654 |
# File 'lib/rex/proto/http/client.rb', line 652 def conn? conn != nil end |
#connect(t = -1)) ⇒ Rex::Socket::Tcp
Connects to the remote server if possible.
165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 |
# File 'lib/rex/proto/http/client.rb', line 165 def connect(t = -1) # If we already have a connection and we aren't pipelining, close it. if conn if !pipelining? close else return conn end end timeout = (t.nil? or t == -1) ? 0 : t self.conn = Rex::Socket::Tcp.create( 'PeerHost' => hostname, 'PeerHostname' => config['ssl_server_name_indication'] || config['vhost'], 'PeerPort' => port.to_i, 'LocalHost' => local_host, 'LocalPort' => local_port, 'Context' => context, 'SSL' => ssl, 'SSLVersion' => ssl_version, 'Proxies' => proxies, 'Timeout' => timeout, 'Comm' => comm ) end |
#digest_auth(opts = {}) ⇒ Response
Send a series of requests to complete Digest Authentication
346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 |
# File 'lib/rex/proto/http/client.rb', line 346 def digest_auth(opts = {}) to = opts['timeout'] || 20 digest_user = opts['username'] || '' digest_password = opts['password'] || '' method = opts['method'] path = opts['uri'] iis = true if (opts['DigestAuthIIS'] == false or config['DigestAuthIIS'] == false) iis = false end begin resp = opts['response'] if !resp # Get authentication-challenge from server, and read out parameters required r = request_cgi(opts.merge({ 'uri' => path, 'method' => method })) resp = _send_recv(r, to) unless resp.is_a? Rex::Proto::Http::Response return nil end if resp.code != 401 return resp end return resp unless resp.headers['WWW-Authenticate'] end # Don't anchor this regex to the beginning of string because header # folding makes it appear later when the server presents multiple # WWW-Authentication options (such as is the case with IIS configured # for Digest or NTLM). resp['www-authenticate'] =~ /Digest (.*)/ parameters = {} ::Regexp.last_match(1).split(/,[[:space:]]*/).each do |p| k, v = p.split('=', 2) parameters[k] = v.gsub('"', '') end auth_digest = Rex::Proto::Http::AuthDigest.new auth = auth_digest.digest(digest_user, digest_password, method, path, parameters, iis) headers = { 'Authorization' => auth.join(', ') } headers.merge!(opts['headers']) if opts['headers'] # Send main request with authentication r = request_cgi(opts.merge({ 'uri' => path, 'method' => method, 'headers' => headers })) resp = _send_recv(r, to, true) unless resp.is_a? Rex::Proto::Http::Response return nil end return resp rescue ::Errno::EPIPE, ::Timeout::Error end end |
#kerberos_auth(opts = {}) ⇒ Object
413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 |
# File 'lib/rex/proto/http/client.rb', line 413 def kerberos_auth(opts = {}) to = opts['timeout'] || 20 auth_result = kerberos_authenticator.authenticate(mechanism: Rex::Proto::Gss::Mechanism::KERBEROS) gss_data = auth_result[:security_blob] gss_data_b64 = Rex::Text.encode_base64(gss_data) # Separate options for the auth requests auth_opts = opts.clone auth_opts['headers'] = opts['headers'].clone auth_opts['headers']['Authorization'] = "Kerberos #{gss_data_b64}" if auth_opts['no_body_for_auth'] auth_opts.delete('data') auth_opts.delete('krb_transform_request') auth_opts.delete('krb_transform_response') end begin # Send the auth request r = request_cgi(auth_opts) resp = _send_recv(r, to) unless resp.is_a? Rex::Proto::Http::Response return nil end # Get the challenge and craft the response response = resp.headers['WWW-Authenticate'].scan(/Kerberos ([A-Z0-9\x2b\x2f=]+)/ni).flatten[0] return resp unless response decoded = Rex::Text.decode_base64(response) mutual_auth_result = kerberos_authenticator.parse_gss_init_response(decoded, auth_result[:session_key]) self.krb_encryptor = kerberos_authenticator.(mutual_auth_result[:ap_rep_subkey], auth_result[:client_sequence_number], mutual_auth_result[:server_sequence_number]) if opts['no_body_for_auth'] # If the body wasn't sent in the authentication, now do the actual request r = request_cgi(opts) resp = _send_recv(r, to, true) end return resp rescue ::Errno::EPIPE, ::Timeout::Error return nil end end |
#negotiate_auth(opts = {}) ⇒ Response
Builds a series of requests to complete Negotiate Auth. Works essentially the same way as Digest auth. Same pipelining concerns exist.
467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 |
# File 'lib/rex/proto/http/client.rb', line 467 def negotiate_auth(opts = {}) to = opts['timeout'] || 20 opts['username'] ||= '' opts['password'] ||= '' if opts['provider'] and opts['provider'].include? 'Negotiate' provider = 'Negotiate ' else provider = 'NTLM ' end opts['method'] ||= 'GET' opts['headers'] ||= {} workstation_name = Rex::Text.rand_text_alpha(rand(6..13)) domain_name = config['domain'] ntlm_client = ::Net::NTLM::Client.new( opts['username'], opts['password'], workstation: workstation_name, domain: domain_name ) type1 = ntlm_client.init_context begin # Separate options for the auth requests auth_opts = opts.clone auth_opts['headers'] = opts['headers'].clone auth_opts['headers']['Authorization'] = provider + type1.encode64 if auth_opts['no_body_for_auth'] auth_opts.delete('data') auth_opts.delete('ntlm_transform_request') auth_opts.delete('ntlm_transform_response') end # First request to get the challenge r = request_cgi(auth_opts) resp = _send_recv(r, to) unless resp.is_a? Rex::Proto::Http::Response return nil end return resp unless resp.code == 401 && resp.headers['WWW-Authenticate'] # Get the challenge and craft the response ntlm_challenge = resp.headers['WWW-Authenticate'].scan(/#{provider}([A-Z0-9\x2b\x2f=]+)/ni).flatten[0] return resp unless ntlm_challenge = ntlm_client.init_context(ntlm_challenge, channel_binding) self.ntlm_client = ntlm_client # Send the response auth_opts['headers']['Authorization'] = "#{provider}#{.encode64}" r = request_cgi(auth_opts) resp = _send_recv(r, to, true) unless resp.is_a? Rex::Proto::Http::Response return nil end if opts['no_body_for_auth'] # If the body wasn't sent in the authentication, now do the actual request r = request_cgi(opts) resp = _send_recv(r, to, true) end return resp rescue ::Errno::EPIPE, ::Timeout::Error return nil end end |
#peerinfo ⇒ Object
Target host addr and port for this connection
666 667 668 669 670 671 672 673 674 675 676 677 |
# File 'lib/rex/proto/http/client.rb', line 666 def peerinfo if conn pi = conn.peerinfo || nil if pi return { 'addr' => pi.split(':')[0], 'port' => pi.split(':')[1].to_i } end end nil end |
#pipelining? ⇒ Boolean
Whether or not connections should be pipelined.
659 660 661 |
# File 'lib/rex/proto/http/client.rb', line 659 def pipelining? pipeline end |
#read_response(t = -1,, opts = {}) ⇒ Response
Read a response from the server
Wait at most t seconds for the full response to be read in. If t is specified as a negative value, it indicates an indefinite wait cycle. If t is specified as nil or 0, it indicates no response parsing is required.
555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 |
# File 'lib/rex/proto/http/client.rb', line 555 def read_response(t = -1, opts = {}) # Return a nil response if timeout is nil or 0 return if t.nil? || t == 0 resp = Response.new resp.max_data = config['read_max_data'] original_request = opts.fetch(:original_request) { nil } parse_opts = {} unless original_request.nil? parse_opts = { orig_method: original_request.opts['method'] } end Timeout.timeout((t < 0) ? nil : t) do rv = nil while ( !conn.closed? and rv != Packet::ParseCode::Completed and rv != Packet::ParseCode::Error ) begin buff = conn.get_once(resp.max_data, 1) rv = resp.parse(buff || '', parse_opts) # Handle unexpected disconnects rescue ::Errno::EPIPE, ::EOFError, ::IOError case resp.state when Packet::ParseState::ProcessingHeader resp = nil when Packet::ParseState::ProcessingBody # truncated request, good enough resp.error = :truncated end break end # This is a dirty hack for broken HTTP servers next unless rv == Packet::ParseCode::Completed rbody = resp.body rbufq = resp.bufq rblob = rbody.to_s + rbufq.to_s tries = 0 begin # XXX: This doesn't deal with chunked encoding while tries < 1000 and resp.headers['Content-Type'] and resp.headers['Content-Type'].start_with?('text/html') and rblob !~ %r{</html>}i buff = conn.get_once(-1, 0.05) break if !buff rblob += buff tries += 1 end rescue ::Errno::EPIPE, ::EOFError, ::IOError end resp.bufq = '' resp.body = rblob end end return resp if !resp # As a last minute hack, we check to see if we're dealing with a 100 Continue here. # Most of the time this is handled by the parser via check_100() if resp.proto == '1.1' and resp.code == 100 and !(opts[:skip_100]) # Read the real response from the body if we found one # If so, our real response became the body, so we re-parse it. if resp.body.to_s =~ /^HTTP/ body = resp.body resp = Response.new resp.max_data = config['read_max_data'] resp.parse(body, parse_opts) # We found a 100 Continue but didn't read the real reply yet # Otherwise reread the reply, but don't try this hack again else resp = read_response(t, skip_100: true) end end resp rescue Timeout::Error # Allow partial response due to timeout resp if config['partial'] end |
#request_cgi(opts = {}) ⇒ ClientRequest
Create a CGI compatible request
149 150 151 152 153 154 155 156 157 |
# File 'lib/rex/proto/http/client.rb', line 149 def request_cgi(opts = {}) opts = config.merge(opts) opts['cgi'] = true opts['port'] = port opts['ssl'] = ssl ClientRequest.new(opts) end |
#request_raw(opts = {}) ⇒ ClientRequest
Create an arbitrary HTTP request
127 128 129 130 131 132 133 134 135 |
# File 'lib/rex/proto/http/client.rb', line 127 def request_raw(opts = {}) opts = config.merge(opts) opts['cgi'] = false opts['port'] = port opts['ssl'] = ssl ClientRequest.new(opts) end |
#send_auth(res, opts, t, persist) ⇒ Response
Resends an HTTP Request with the proper authentication headers set. If we do not support the authentication type the server requires we return the original response object
275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 |
# File 'lib/rex/proto/http/client.rb', line 275 def send_auth(res, opts, t, persist) if opts['username'].nil? or opts['username'] == '' if username and !(username == '') opts['username'] = username opts['password'] = password else opts['username'] = nil opts['password'] = nil end end if opts[:kerberos_authenticator].nil? opts[:kerberos_authenticator] = kerberos_authenticator end return res if (opts['username'].nil? or opts['username'] == '') and opts[:kerberos_authenticator].nil? supported_auths = res.headers['WWW-Authenticate'] # if several providers are available, the client may want one in particular preferred_auth = opts['preferred_auth'] if supported_auths.include?('Basic') && (preferred_auth.nil? || preferred_auth == 'Basic') opts['headers'] ||= {} opts['headers']['Authorization'] = basic_auth_header(opts['username'], opts['password']) req = request_cgi(opts) res = _send_recv(req, t, persist) return res elsif supported_auths.include?('Digest') && (preferred_auth.nil? || preferred_auth == 'Digest') temp_response = digest_auth(opts) if temp_response.is_a? Rex::Proto::Http::Response res = temp_response end return res elsif supported_auths.include?('NTLM') && (preferred_auth.nil? || preferred_auth == 'NTLM') opts['provider'] = 'NTLM' temp_response = negotiate_auth(opts) if temp_response.is_a? Rex::Proto::Http::Response res = temp_response end return res elsif supported_auths.include?('Negotiate') && (preferred_auth.nil? || preferred_auth == 'Negotiate') opts['provider'] = 'Negotiate' temp_response = negotiate_auth(opts) if temp_response.is_a? Rex::Proto::Http::Response res = temp_response end return res elsif supported_auths.include?('Negotiate') && (preferred_auth.nil? || preferred_auth == 'Kerberos') opts['provider'] = 'Negotiate' temp_response = kerberos_auth(opts) if temp_response.is_a? Rex::Proto::Http::Response res = temp_response end return res end return res end |
#send_recv(req, t = -1,, persist = false) ⇒ Response
Sends a request and gets a response back
If the request is a 401, and we have creds, it will attempt to complete authentication and return the final response
212 213 214 215 216 217 218 |
# File 'lib/rex/proto/http/client.rb', line 212 def send_recv(req, t = -1, persist = false) res = _send_recv(req, t, persist) if res and res.code == 401 and res.headers['WWW-Authenticate'] res = send_auth(res, req.opts, t, persist) end res end |
#send_request(req, t = -1)) ⇒ void
This method returns an undefined value.
Send an HTTP request to the server
260 261 262 263 |
# File 'lib/rex/proto/http/client.rb', line 260 def send_request(req, t = -1) connect(t) conn.put(req.to_s) end |
#set_config(opts = {}) ⇒ Object
Set configuration options
82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 |
# File 'lib/rex/proto/http/client.rb', line 82 def set_config(opts = {}) opts.each_pair do |var, val| # Default type is string typ = config_types[var] || 'string' # These are enum types if typ.is_a?(Array) && !typ.include?(val) raise "The specified value for #{var} is not one of the valid choices" end # The caller should have converted these to proper ruby types, but # take care of the case where they didn't before setting the # config. if (typ == 'bool') val = val == true || val.to_s =~ /^(t|y|1)/i end if (typ == 'integer') val = val.to_i end config[var] = val end end |
#stop ⇒ Object
Cleans up any outstanding connections and other resources.
645 646 647 |
# File 'lib/rex/proto/http/client.rb', line 645 def stop close end |