This Metasploit module has three actions. The first (and the default) is WebServer which uses a combination of client-side and server-side techniques to fingerprint HTTP clients and then automatically exploit them. Next is DefangedDetection which does only the fingerprinting part. Lastly, list simply prints the names of all exploit modules that would be used by the WebServer action given the current MATCH and EXCLUDE options. Also adds a list command which is the same as running with ACTION=list.
This Metasploit module has three actions. The first (and the default) is WebServer which uses a combination of client-side and server-side techniques to fingerprint HTTP clients and then automatically exploit them. Next is DefangedDetection which does only the fingerprinting part. Lastly, list simply prints the names of all exploit modules that would be used by the WebServer action given the current MATCH and EXCLUDE options. Also adds a list command which is the same as running with ACTION=list.