diff --git a/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb b/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb index 4b33b58dde..b21504bed2 100644 --- a/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb +++ b/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb @@ -52,6 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote # Since we don't include Tcp, we have to register this manually Opt::RHOST(), Opt::RPORT(22), + Opt::Proxies ], self.class ) @@ -81,7 +82,8 @@ class Metasploit3 < Msf::Exploit::Remote :key_data => [ key_data ], :disable_agent => true, :config => false, - :record_auth_info => true + :record_auth_info => true, + :proxies => datastore['Proxies'] } opt_hash.merge!(:verbose => :debug) if datastore['SSH_DEBUG'] begin diff --git a/modules/exploits/windows/ssh/sysax_ssh_username.rb b/modules/exploits/windows/ssh/sysax_ssh_username.rb index 30e489678c..afd1085086 100644 --- a/modules/exploits/windows/ssh/sysax_ssh_username.rb +++ b/modules/exploits/windows/ssh/sysax_ssh_username.rb @@ -217,7 +217,8 @@ class Metasploit3 < Msf::Exploit::Remote { :password => pass, :port => datastore['RPORT'], - :timeout => 1 + :timeout => 1, + :proxies => datastore['Proxies'] }) ::Timeout.timeout(1) {ssh.close} rescue nil