Skip to content

Commit 86c0548

Browse files
authored
Merge pull request #286 from vulncheck-oss/fix_285
Fix #285 - FileFormat and -o interaction
2 parents 6f90a50 + 0aea620 commit 86c0548

File tree

2 files changed

+4
-3
lines changed

2 files changed

+4
-3
lines changed

cli/commandline.go

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -769,10 +769,11 @@ func FormatFileCmdLineParse(conf *config.Config) bool {
769769
}
770770

771771
// must be validate (to set default for payload gen) and then check third party c2
772-
if !conf.ThirdPartyC2Server && !validateC2Selection(c2Selection, conf) {
772+
if !validateC2Selection(c2Selection, conf) {
773773
return false
774774
}
775-
if !conf.ThirdPartyC2Server && (conf.Lport == 0 || len(conf.Lhost) == 0) {
775+
776+
if conf.Lport == 0 || len(conf.Lhost) == 0 {
776777
output.PrintFrameworkError("Missing exploitation options (-Lhost or -Lport)")
777778

778779
return false

config/config.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -315,7 +315,7 @@ func (conf *Config) GetBoolFlag(name string) bool {
315315
// Some C2 (ShellTunnel) don't actually care how the payload is generated, but
316316
// the underlying C2 might be implied depending on how the individual exploit
317317
// has been developed. It is certainly not a requirement to call this function
318-
// but it can help simplify the handling of secure shell vs insecure
318+
// but it can help simplify the handling of secure shell vs insecure.
319319
func (conf *Config) ResolveC2Payload() c2.Impl {
320320
if conf.C2Type != c2.ShellTunnel {
321321
return conf.C2Type

0 commit comments

Comments
 (0)