-
Notifications
You must be signed in to change notification settings - Fork 807
2952 smb exploiter #3094
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
2952 smb exploiter #3094
Conversation
**kwargs, | ||
) -> ExploiterResultData: | ||
# HTTP ports options are hack because they are needed in fingerprinters | ||
del_key(options, "http_ports") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do we delete this? If this exploiter doesn't use it, just ignore?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Because we parse the options dict to the specific exploiter pydantic options. If the passed options have http_ports
inside then it throws an error.
b3e2c7b
to
38dad20
Compare
0745410
to
b00f475
Compare
38dad20
to
59409f6
Compare
The exploit client doesn't exist yet so this won't work right now
The exploit client doesn't exist yet so this won't work right now
59409f6
to
1db55c1
Compare
ffab600
to
f3a6de8
Compare
What does this PR do?
Fixes #2952.
Add any further explanations here.
PR Checklist
Testing Checklist