Skip to content

Commit 639dee9

Browse files
Fixed interactive password prompt issue
Fixed an issue where the exploit would drop to interactive password prompt by default on newer ruby version which rendered the exploit unusable. It now properly forces pubkey authentication instead and proceeds with the bypass as expected.
1 parent 5de1d34 commit 639dee9

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/windows/ssh/freesshd_authbypass.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,8 @@ def setup_ssh_options
107107
:port => datastore['RPORT'],
108108
:timeout => 1,
109109
:proxies => datastore['Proxies'],
110-
:key_data => OpenSSL::PKey::RSA.new(2048).to_pem
110+
:key_data => OpenSSL::PKey::RSA.new(2048).to_pem,
111+
:auth_methods => ['publickey']
111112
}
112113
return options
113114
end

0 commit comments

Comments
 (0)