Tiny PEP8 change and changed reporting of vulnerable URLs in shellshock

This commit is contained in:
daniel goldberg 2016-08-29 15:46:47 +03:00
parent 30cb88f01d
commit 91427eb346
2 changed files with 2 additions and 2 deletions

View File

@ -135,7 +135,7 @@ class Configuration(object):
scanner_class = TcpScanner scanner_class = TcpScanner
finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger] finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger]
exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits
SSHExploiter, ShellShockExploiter #Linux SSHExploiter, ShellShockExploiter # Linux
] ]
# how many victims to look for in a single scan iteration # how many victims to look for in a single scan iteration

View File

@ -208,6 +208,6 @@ class ShellShockExploiter(HostExploiter):
@staticmethod @staticmethod
def report_vuln_shellshock(host, url): def report_vuln_shellshock(host, url):
from control import ControlClient from control import ControlClient
ControlClient.send_telemetry('exploit', {'result': False, 'machine': host.__dict__, ControlClient.send_telemetry('exploit', {'vulnerable': True, 'machine': host.__dict__,
'exploiter': ShellShockExploiter.__name__, 'exploiter': ShellShockExploiter.__name__,
'url': url}) 'url': url})