diff --git a/chaos_monkey/config.py b/chaos_monkey/config.py index c56c7f0c2..936b3b308 100644 --- a/chaos_monkey/config.py +++ b/chaos_monkey/config.py @@ -135,7 +135,7 @@ class Configuration(object): scanner_class = TcpScanner finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger] exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits - SSHExploiter, ShellShockExploiter #Linux + SSHExploiter, ShellShockExploiter # Linux ] # how many victims to look for in a single scan iteration diff --git a/chaos_monkey/exploit/shellshock.py b/chaos_monkey/exploit/shellshock.py index 08afe87b2..411fe4373 100644 --- a/chaos_monkey/exploit/shellshock.py +++ b/chaos_monkey/exploit/shellshock.py @@ -208,6 +208,6 @@ class ShellShockExploiter(HostExploiter): @staticmethod def report_vuln_shellshock(host, url): from control import ControlClient - ControlClient.send_telemetry('exploit', {'result': False, 'machine': host.__dict__, + ControlClient.send_telemetry('exploit', {'vulnerable': True, 'machine': host.__dict__, 'exploiter': ShellShockExploiter.__name__, 'url': url})