Tiny PEP8 change and changed reporting of vulnerable URLs in shellshock
This commit is contained in:
parent
30cb88f01d
commit
91427eb346
|
@ -135,7 +135,7 @@ class Configuration(object):
|
||||||
scanner_class = TcpScanner
|
scanner_class = TcpScanner
|
||||||
finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger]
|
finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger]
|
||||||
exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits
|
exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits
|
||||||
SSHExploiter, ShellShockExploiter #Linux
|
SSHExploiter, ShellShockExploiter # Linux
|
||||||
]
|
]
|
||||||
|
|
||||||
# how many victims to look for in a single scan iteration
|
# how many victims to look for in a single scan iteration
|
||||||
|
|
|
@ -208,6 +208,6 @@ class ShellShockExploiter(HostExploiter):
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def report_vuln_shellshock(host, url):
|
def report_vuln_shellshock(host, url):
|
||||||
from control import ControlClient
|
from control import ControlClient
|
||||||
ControlClient.send_telemetry('exploit', {'result': False, 'machine': host.__dict__,
|
ControlClient.send_telemetry('exploit', {'vulnerable': True, 'machine': host.__dict__,
|
||||||
'exploiter': ShellShockExploiter.__name__,
|
'exploiter': ShellShockExploiter.__name__,
|
||||||
'url': url})
|
'url': url})
|
||||||
|
|
Loading…
Reference in New Issue