next_message can be nil sometimes if packet is nil (see net/ssh's poll_message source)
Because why not. One more trick to a pentest + coverage = better.
Keyboard-interactive method isn't required to exploit Tectia SSH. So this update will just go straight to password method. There's also improvements for the check() method: Not only does it check the SSH version (banner), it will also check and see if the server is using password method to auth.
…t-framework into h0ng10-indesign_server
Support for MacOS X
…ramework into R3dy-loggedin_users
…asploit-framework into jvazquez-r7-psexec_command_fix
… into mubix-patch-4
"Appears" is a more accureate way describing how much we think the host is vulnerable.