Agent: Remove attempt to get architecture from target in ssh exploiter

Since Infection Monkey only supports the x86_64 architecture,there's
little use in collecting the architecture from the destination.
This commit is contained in:
Mike Salvatore 2022-02-28 11:22:23 -05:00
parent 54715df43d
commit eea07461c5
1 changed files with 0 additions and 12 deletions

View File

@ -149,18 +149,6 @@ class SSHExploiter(HostExploiter):
logger.error(self.exploit_result.error_message) logger.error(self.exploit_result.error_message)
return self.exploit_result return self.exploit_result
if not self.host.os.get("machine"):
try:
_, stdout, _ = ssh.exec_command("uname -m")
uname_machine = stdout.read().lower().strip().decode()
if "" != uname_machine:
self.host.os["machine"] = uname_machine
except Exception as exc:
self.exploit_result.error_message = (
f"Error running uname machine command on victim {self.host}: ({exc})"
)
logger.error(self.exploit_result.error_message)
src_path = get_target_monkey(self.host) src_path = get_target_monkey(self.host)
if not src_path: if not src_path: