Stefan-mcp

Results 8 comments of Stefan-mcp

setting the exploit to poor made the search work for me on the kali current repo version - however: ** Exploits launched through armitage failed - despite the same exploits...

Not really a resolution just rolling back to a former kali version, theres a ton of bugs you'll be subject to again by rolling back all packages

En10mb, its weird cus I can see the code check for it that should be picking it up. Unfortunatly I dont have the time to play with it atm else...

ive implemented the type 1 and type 2 attacks in python for Rlogin and RSH - had to reverse engineer the protocols as they're too old for there to be...

Be good to see this broken off to use a separate file. No point leaving the script ineffective when all that needs changing is a file path. Good catch h00die...

Could some error reporting code be added as a quick patch to make the user aware that the calling script may be failing, even if the error info isn't propagated...

My concern is that people wont routinely be running nmap with debug on. If my understanding is correct, at the moment some scripts could be outputting an explicit 'Not Vulnerable'...