From 91427eb3466fc5d8c25aa7dc87c203db928faf5c Mon Sep 17 00:00:00 2001 From: daniel goldberg Date: Mon, 29 Aug 2016 15:46:47 +0300 Subject: [PATCH] Tiny PEP8 change and changed reporting of vulnerable URLs in shellshock --- chaos_monkey/config.py | 2 +- chaos_monkey/exploit/shellshock.py | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/chaos_monkey/config.py b/chaos_monkey/config.py index c56c7f0c2..936b3b308 100644 --- a/chaos_monkey/config.py +++ b/chaos_monkey/config.py @@ -135,7 +135,7 @@ class Configuration(object): scanner_class = TcpScanner finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger] exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits - SSHExploiter, ShellShockExploiter #Linux + SSHExploiter, ShellShockExploiter # Linux ] # how many victims to look for in a single scan iteration diff --git a/chaos_monkey/exploit/shellshock.py b/chaos_monkey/exploit/shellshock.py index 08afe87b2..411fe4373 100644 --- a/chaos_monkey/exploit/shellshock.py +++ b/chaos_monkey/exploit/shellshock.py @@ -208,6 +208,6 @@ class ShellShockExploiter(HostExploiter): @staticmethod def report_vuln_shellshock(host, url): from control import ControlClient - ControlClient.send_telemetry('exploit', {'result': False, 'machine': host.__dict__, + ControlClient.send_telemetry('exploit', {'vulnerable': True, 'machine': host.__dict__, 'exploiter': ShellShockExploiter.__name__, 'url': url})