From f7b0c5d098aa262d9a27248bfee565f0d013b7ad Mon Sep 17 00:00:00 2001 From: Thorsten Sick Date: Thu, 24 Jun 2021 15:03:09 +0200 Subject: [PATCH] pep8 --- plugins/default/adversary_emulations/FIN7/fin7_section1.py | 3 --- 1 file changed, 3 deletions(-) diff --git a/plugins/default/adversary_emulations/FIN7/fin7_section1.py b/plugins/default/adversary_emulations/FIN7/fin7_section1.py index 2cac324..817512d 100644 --- a/plugins/default/adversary_emulations/FIN7/fin7_section1.py +++ b/plugins/default/adversary_emulations/FIN7/fin7_section1.py @@ -249,9 +249,6 @@ class FIN7Plugin(AttackPlugin): # Start situation: Step 6 executed a meterpreter in hollow.exe We can fake that to be able to start with step 7 directly - - - # This is meterpreter ! # Emulating DLL hijacking functionality of BOOSTWRITE