The option to disable fake local shell on exit

This commit is contained in:
g0tmi1k 2014-06-02 16:20:22 +01:00
parent 9494bf6c2a
commit a3d965e824
2 changed files with 13 additions and 1 deletions

View File

@ -141,6 +141,12 @@ ssh_version_string = SSH-2.0-OpenSSH_5.1p1 Debian-5
# (default: not specified)
#banner_file =
# Allow the attacker to exit the honeypot on request or try to 'trick' the attacker with another shell.
# note: depending on the attackers client (e.g. putty), will just quit regardless.
#
# (default: true)
exit_jail = true
# Session management interface.
#
# This is a telnet based service that can be used to interact with active

View File

@ -52,9 +52,15 @@ commands['exxxit'] = command_exxxit
class command_exit(HoneyPotCommand):
def call(self):
cfg = config()
self.exit_jail = True
if cfg.has_option('honeypot', 'exit_jail'):
if (cfg.get('honeypot', 'exit_jail') == "false"):
self.exit_jail = False
if 'PuTTY' in self.honeypot.clientVersion or \
'libssh' in self.honeypot.clientVersion or \
'sshlib' in self.honeypot.clientVersion:
'sshlib' in self.honeypot.clientVersion or \
self.exit_jail is False:
self.honeypot.terminal.loseConnection()
return
self.honeypot.terminal.reset()