rapid7/metasploit_data_models

View on GitHub
app/models/mdm/async_callback.rb

Summary

Maintainability
A
0 mins
Test Coverage
# An asychronous callback that has been received by the Mettle Pingback Listener and is logged
class Mdm::AsyncCallback < ApplicationRecord
  extend ActiveSupport::Autoload

  include Metasploit::Model::Search

  #
  # Associations
  #


  #
  # Attributes
  #

  # @!attribute [rw] uuid
  #   A 16-byte unique identifier for this payload. The UUID is encoded to include specific information.
  #   See lib/msf/core/payload/uuid.rb in the https://github.com/rapid7/metasploit-framework repo.
  #
  #   @return [String]

  # @!attribute [rw] timestamp
  #   The Unix format timestamp when this payload called back.
  #
  #   @return [Integer]

  # @!attribute [rw] listener_uri
  #   Non-unique URIs (eg. "tcp://192.168.1.7:4444") which received callbacks from this payload.
  #
  #   @return [String]

  # @!attribute [rw] target_host
  #   The IP address (eg. "192.168.1.7" or "fe80::1") from which the callback originated, from the view of the callback listener.
  #
  #   @return [String]

  # @!attribute [rw] target_port
  #   The IP port (eg. "4444") from which the callback originated, from the view of the callback listener.
  #
  #   @return [Integer]

  #
  # Validations
  #


  #
  # Search Attributes
  #

  search_attribute :uuid,
                   type: :string

  #
  # Serializations
  #

  # NONE


  public

  Metasploit::Concern.run(self)
end