[Nightly] Update v0.7.3499a
[h3]Changelog[/h3]
- [b]metaxploit.net_use[/b] now allows direct connection to a router that has a firewall enabled. In this way you can remotely scan the library and run the firewall deactivation exploit if there is a vulnerability with [b]metalib.overflow[/b]. If the firewall is enabled, any attempt to exploit the router for any vulnerability other than the firewall will fail.
- Removed [b]metaxploit.firewall_overflow[/b] since now [b]metalib.overflow[/b] is used.
- Disabled use of md5 method for encode/decode.
- Updated code of firewall exploits in hackshops.
[b]NOTE[/b]: Any such exploit downloaded before this patch will not work, it must be downloaded again.
- Fixed Bug #633: Terminal acts like File System does not exist after disconnecting from machine.
- Fixed Bug #576: File permissions issue with root exploits.
[h3][Nightly] Update v0.7.3496a[/h3]
- Fixed bug in the chat that prevented sending messages in the public channel.
- Added documentation for the bitwise scripting method in the general section.
- Fixed bug when generating the firewall exploit in hackshops with wrong code.
- Fixed bug that prevented the decipher from being downloaded from the mail program as an attachment.
- Fixed bug when not showing any transaction when logging into the bank account.
- Fixed bug in decipher not being able to show the root user password from routers and switches.
- Reverted change in network generation, which forced the root password to be different on each device on the network.
- Increased starter money for testing purposes.