From ac69064dece1ff0a1af4c5d4d6b742de618b329c Mon Sep 17 00:00:00 2001 From: Kekoa Kaaikala Date: Wed, 5 Oct 2022 12:31:19 +0000 Subject: [PATCH] Agent: Send failed exploitation event --- monkey/infection_monkey/exploit/log4shell.py | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/monkey/infection_monkey/exploit/log4shell.py b/monkey/infection_monkey/exploit/log4shell.py index daed11652..1a3dc9d61 100644 --- a/monkey/infection_monkey/exploit/log4shell.py +++ b/monkey/infection_monkey/exploit/log4shell.py @@ -199,7 +199,14 @@ class Log4ShellExploiter(WebRCE): time.sleep(1) - logger.debug("Timed out while waiting for victim to download the java bytecode") + error_message = "Timed out while waiting for victim to download the java bytecode" + logger.debug(error_message) + self._publish_exploitation_event( + target=self.host.ip_addr, + exploitation_success=False, + error_message=error_message, + tags=(LOG4SHELL_EXPLOITER_TAG, T1203_ATTACK_TECHNIQUE_TAG), + ) return False def _wait_for_victim_to_download_agent(self):