diff --git a/monkey/infection_monkey/exploit/web_rce.py b/monkey/infection_monkey/exploit/web_rce.py index e03004942..ef13fd345 100644 --- a/monkey/infection_monkey/exploit/web_rce.py +++ b/monkey/infection_monkey/exploit/web_rce.py @@ -77,10 +77,6 @@ class WebRCE(HostExploiter): # vulnerable. exploit_config["stop_checking_urls"] = False - # blind_exploit: If true we won't check if file exist and won't try to get the - # architecture of target. - exploit_config["blind_exploit"] = False - return exploit_config def _exploit_host(self): @@ -105,10 +101,6 @@ class WebRCE(HostExploiter): self.target_url = self.get_target_url() - # Check for targets architecture (if it's 32 or 64 bit) - if not exploit_config["blind_exploit"]: - return False - # Upload the right monkey to target data = self.upload_monkey(self.get_target_url(), exploit_config["upload_commands"]) diff --git a/monkey/infection_monkey/exploit/weblogic.py b/monkey/infection_monkey/exploit/weblogic.py index d310833db..b2747a3f2 100644 --- a/monkey/infection_monkey/exploit/weblogic.py +++ b/monkey/infection_monkey/exploit/weblogic.py @@ -68,7 +68,6 @@ class WebLogic201710271(WebRCE): def get_exploit_config(self): exploit_config = super(WebLogic201710271, self).get_exploit_config() - exploit_config["blind_exploit"] = True exploit_config["stop_checking_urls"] = True exploit_config["url_extensions"] = WebLogic201710271.URLS return exploit_config @@ -267,7 +266,6 @@ class WebLogic20192725(WebRCE): def get_exploit_config(self): exploit_config = super(WebLogic20192725, self).get_exploit_config() exploit_config["url_extensions"] = WebLogic20192725.URLS - exploit_config["blind_exploit"] = True exploit_config["dropper"] = True return exploit_config