From 79fbd8b6000f41ad727ac218185653d07f2d6a15 Mon Sep 17 00:00:00 2001 From: Mike Salvatore Date: Tue, 14 Jun 2022 14:33:19 -0400 Subject: [PATCH] Agent: Remove stale comment --- monkey/infection_monkey/exploit/mssqlexec.py | 5 ----- 1 file changed, 5 deletions(-) diff --git a/monkey/infection_monkey/exploit/mssqlexec.py b/monkey/infection_monkey/exploit/mssqlexec.py index ff45683de..ab8e71fc1 100644 --- a/monkey/infection_monkey/exploit/mssqlexec.py +++ b/monkey/infection_monkey/exploit/mssqlexec.py @@ -45,11 +45,6 @@ class MSSQLExploiter(HostExploiter): self.payload_file_path = MSSQLExploiter.TMP_DIR_PATH / MSSQLExploiter.TMP_FILE_NAME def _exploit_host(self) -> ExploiterResultData: - """ - First this method brute forces to get the mssql connection (cursor). - Also, don't forget to start_monkey_server() before self.upload_monkey() and - self.stop_monkey_server() after - """ monkey_path_on_victim = get_agent_dst_path(self.host) # Brute force to get connection