bcoles
11cf391da8
modules/exploits/linux/ssh: Resolve Rubocop violations
2023-01-31 23:59:22 +11:00
Jack Heysel
37e334f95d
Rubocop
2022-04-18 09:36:52 -07:00
Jack Heysel
9e283ae1b1
Refactored aassigned list of modules
2022-04-18 09:35:08 -07:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
William Vu
32334c2386
Update all module splats from http:// to https://
2019-08-15 18:10:44 -05:00
William Vu
e69f006992
Remove CommandShell mixin in exploits
...
This was cargo culting. Exploits use handler instead of start_session.
2018-12-12 15:43:13 -06:00
William Vu
60c0272270
Make style consistent
2018-08-15 21:27:40 -05:00
Kevin Kirsche
cd01f11fd2
Remove verifying host keys for all exploits
2018-08-15 14:54:41 -07:00
Brent Cook
b1d0529161
prefer 'shell' channels over 'exec' channels for ssh
...
If a command is not specified to CommandStream, request a "shell"
session rather than running exec. This allows targets that do not have a
true "shell" which supports exec to instead return a raw shell session.
2018-02-08 02:21:16 -06:00
Brent Cook
1225555125
remove unnecessary require
2017-08-20 17:37:42 -05:00
phroxvs
a9a83bc21c
fix for uninitialized constant in Net::SSH on OS X
2017-01-03 06:16:07 -05:00
phroxvs
3c2486b9f5
initial version of CVE-2016-7456 exploit
2017-01-03 03:39:22 -05:00
phroxvs
589084896a
initial version of CVE-2016-7456 exploit
2017-01-03 03:36:49 -05:00