forked from p15670423/monkey
Agent: Remove attempt to get architecture from target in ssh exploiter
Since Infection Monkey only supports the x86_64 architecture,there's little use in collecting the architecture from the destination.
This commit is contained in:
parent
54715df43d
commit
eea07461c5
|
@ -149,18 +149,6 @@ class SSHExploiter(HostExploiter):
|
|||
logger.error(self.exploit_result.error_message)
|
||||
return self.exploit_result
|
||||
|
||||
if not self.host.os.get("machine"):
|
||||
try:
|
||||
_, stdout, _ = ssh.exec_command("uname -m")
|
||||
uname_machine = stdout.read().lower().strip().decode()
|
||||
if "" != uname_machine:
|
||||
self.host.os["machine"] = uname_machine
|
||||
except Exception as exc:
|
||||
self.exploit_result.error_message = (
|
||||
f"Error running uname machine command on victim {self.host}: ({exc})"
|
||||
)
|
||||
logger.error(self.exploit_result.error_message)
|
||||
|
||||
src_path = get_target_monkey(self.host)
|
||||
|
||||
if not src_path:
|
||||
|
|
Loading…
Reference in New Issue