You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm not sure if this should be under feature request or a bug.
Steps to reproduce
How'd you do it?
Use aux/scanner/ssh/ssh_enumusers
set user_file to /usr/share/wordlists/dirbuster/apache-user-enum-1.0.txt
This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.
Expected behavior
What should happen?
The scanner skips the comment section and continues to the list of words.
Current behavior
What happens instead?
It uses the comment section as input.
System stuff
Metasploit version
Get this with the version command in msfconsole (or git log -1 --pretty=oneline for a source install).
Framework: 5.0.11-dev
Console : 5.0.11-dev
This should probably be an advanced option IgnoreComments, off by default, so as to not unintentionally skip passwords beginning with a #.
An over-engineered approach may be to count the number of lines beginning with # and throw a warning. At which point it would already be too late, so, 🤷
As far as I'm aware, no standard exists for word lists. Considering lines prefaced with # to be comments is an unofficial standard. For example, despite their frequent use in CSV documents, the CSV standard does not permit comments.
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here.
If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
dwelch-r7
added
not-stale
Label to stop an issue from being auto closed
and removed
Stale
Marks an issue as stale, to be closed if no action is taken
labels
Nov 20, 2020
I'm not sure if this should be under feature request or a bug.
Steps to reproduce
How'd you do it?
This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.
Expected behavior
What should happen?
The scanner skips the comment section and continues to the list of words.
Current behavior
What happens instead?
It uses the comment section as input.
System stuff
Metasploit version
Get this with the
version
command in msfconsole (orgit log -1 --pretty=oneline
for a source install).Framework: 5.0.11-dev
Console : 5.0.11-dev
I installed Metasploit with:
OS
What OS are you running Metasploit on?
Kali 2019.1
The text was updated successfully, but these errors were encountered: