From 5f8547a7eeb14d09ce65a4124d885b8f4710720b Mon Sep 17 00:00:00 2001 From: Shreya Date: Thu, 6 May 2021 16:33:37 +0530 Subject: [PATCH] Remove unused `set_vulnerable_port_from_url()` from `infection_monkey/exploit/web_rce.py` --- monkey/infection_monkey/exploit/web_rce.py | 3 --- 1 file changed, 3 deletions(-) diff --git a/monkey/infection_monkey/exploit/web_rce.py b/monkey/infection_monkey/exploit/web_rce.py index dafa6164a..7f268b18f 100644 --- a/monkey/infection_monkey/exploit/web_rce.py +++ b/monkey/infection_monkey/exploit/web_rce.py @@ -578,9 +578,6 @@ class WebRCE(HostExploiter): LOG.debug("Target's machine type was not set. Using win-32 dropper path.") return self._config.dropper_target_path_win_32 - def set_vulnerable_port_from_url(self, url): - self.vulnerable_port = HTTPTools.get_port_from_url(url) - def get_target_url(self): """ This method allows "configuring" the way in which a vulnerable URL is picked.