forked from p15670423/monkey
Agent: Remove attempt to get architecture from target in ssh exploiter
Since Infection Monkey only supports the x86_64 architecture,there's little use in collecting the architecture from the destination.
This commit is contained in:
parent
54715df43d
commit
eea07461c5
|
@ -149,18 +149,6 @@ class SSHExploiter(HostExploiter):
|
||||||
logger.error(self.exploit_result.error_message)
|
logger.error(self.exploit_result.error_message)
|
||||||
return self.exploit_result
|
return self.exploit_result
|
||||||
|
|
||||||
if not self.host.os.get("machine"):
|
|
||||||
try:
|
|
||||||
_, stdout, _ = ssh.exec_command("uname -m")
|
|
||||||
uname_machine = stdout.read().lower().strip().decode()
|
|
||||||
if "" != uname_machine:
|
|
||||||
self.host.os["machine"] = uname_machine
|
|
||||||
except Exception as exc:
|
|
||||||
self.exploit_result.error_message = (
|
|
||||||
f"Error running uname machine command on victim {self.host}: ({exc})"
|
|
||||||
)
|
|
||||||
logger.error(self.exploit_result.error_message)
|
|
||||||
|
|
||||||
src_path = get_target_monkey(self.host)
|
src_path = get_target_monkey(self.host)
|
||||||
|
|
||||||
if not src_path:
|
if not src_path:
|
||||||
|
|
Loading…
Reference in New Issue