CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/lib/msf/core/module/failure.rb
Views: 11784
1
# Constants indicating the reason for an unsuccessful module attempt
2
module Msf::Module::Failure
3
# The exploit settings were incorrect
4
BadConfig = 'bad-config'
5
6
# The network service disconnected us mid-attempt
7
Disconnected = 'disconnected'
8
9
# The application replied indication we do not have access
10
NoAccess = 'no-access'
11
12
# No confidence in success or failure
13
None = 'none'
14
15
# The target is not compatible with this exploit or settings
16
NoTarget = 'no-target'
17
18
# The application endpoint or specific service was not found
19
NotFound = 'not-found'
20
21
# The application response indicated it was not vulnerable
22
NotVulnerable = 'not-vulnerable'
23
24
# The payload was delivered but no session was opened (AV, network, etc)
25
PayloadFailed = 'payload-failed'
26
27
# The exploit triggered some form of timeout
28
TimeoutExpired = 'timeout-expired'
29
30
# The application replied in an unexpected fashion
31
UnexpectedReply = 'unexpected-reply'
32
33
# No confidence in success or failure
34
Unknown = 'unknown'
35
36
# The network service was unreachable (connection refused, etc)
37
Unreachable = 'unreachable'
38
39
# The exploit was interrupted by the user
40
UserInterrupt = 'user-interrupt'
41
end
42