Stefan-mcp
Stefan-mcp
setting the exploit to poor made the search work for me on the kali current repo version - however: ** Exploits launched through armitage failed - despite the same exploits...
Not really a resolution just rolling back to a former kali version, theres a ton of bugs you'll be subject to again by rolling back all packages
En10mb, its weird cus I can see the code check for it that should be picking it up. Unfortunatly I dont have the time to play with it atm else...
willl try to get this to you soon :)
ive implemented the type 1 and type 2 attacks in python for Rlogin and RSH - had to reverse engineer the protocols as they're too old for there to be...
Be good to see this broken off to use a separate file. No point leaving the script ineffective when all that needs changing is a file path. Good catch h00die...
Could some error reporting code be added as a quick patch to make the user aware that the calling script may be failing, even if the error info isn't propagated...
My concern is that people wont routinely be running nmap with debug on. If my understanding is correct, at the moment some scripts could be outputting an explicit 'Not Vulnerable'...