Grant Willcox

Results 252 comments of Grant Willcox
trafficstars

@k0pak4 Looks like most comments were resolved. Still have an outstanding concern r.e the `check` method. See comments above for more info. I went ahead and fixed the other issues...

Alright I think this should be ready for testing, just going over the 4 commits you made to see if there is anything I might have missed, and then will...

> > Alright I think this should be ready for testing, just going over the 4 commits you made to see if there is anything I might have missed, and...

All comments resolved, will download latest updates and test now.

Tried this against a target with most things up but license wasn't signed and got this: ``` msf6 exploit(linux/http/nagios_xi_configwizards_authenticated_rce) > exploit [*] Started reverse SSL handler on 192.168.153.128:9983 [*] Running...

> > Tried this against a target with most things up but license wasn't signed and got this: > > ``` > > msf6 exploit(linux/http/nagios_xi_configwizards_authenticated_rce) > exploit > > >...

Edit: https://github.com/rapid7/metasploit-framework/pull/17494/commits/d7024a0efe97ba5c99e862152c45d35a48e9098a should solve the case of the missing case 5 check before we do the extraction of the cookies and auth info, and that is working for me now...

Alright at the moment I'm getting all the way to the final stage and then I'm getting `NSP: Sorry Dave, I can't let you do that` error messages when trying...

Okay figured out that with the update to `match` we needed to update the resulting entry to `nsp[1]` instead of `nsp[0]` otherwise we get extra characters. Going to run a...

Alright seems this is all working now. Only question I have is a minor one r.e why it seems that it fails to extract authentication cookies on the first authentication...