From 2785dccdf054d0712ce26ec834616928a1b0685f Mon Sep 17 00:00:00 2001 From: Brendan Coles Date: Sun, 23 Nov 2014 23:03:18 +0000 Subject: [PATCH] Remove author --- modules/exploits/shell_shocked/config.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/shell_shocked/config.yaml b/modules/exploits/shell_shocked/config.yaml index 18cd7c1c5..589fd4372 100644 --- a/modules/exploits/shell_shocked/config.yaml +++ b/modules/exploits/shell_shocked/config.yaml @@ -10,6 +10,6 @@ beef: category: "Exploits" name: "Shell Shock" description: "Attempt to use vulnerability CVE-2014-627 to execute arbitrary code. The default command attempts to get a reverse shell.
Note: Set the LHOST and LPORT." - authors: ["Stephane Chazelas", "mz", "radoen", "bcoles"] + authors: ["Stephane Chazelas", "mz", "radoen"] target: working: ["All"]