3ddcf73c2b
Use blocks to check whether each service is exploitable as they are enumerated. With this change, it is the service and path enumeration halts once an exploitable one is found that yields a session. Also all files are registered for cleanup.