diff --git a/monkey/infection_monkey/exploit/zerologon.py b/monkey/infection_monkey/exploit/zerologon.py index 6f13f16c4..849e6935a 100644 --- a/monkey/infection_monkey/exploit/zerologon.py +++ b/monkey/infection_monkey/exploit/zerologon.py @@ -275,11 +275,6 @@ class ZerologonExploiter(HostExploiter): self._extracted_creds[user]["lm_hash"], self._extracted_creds[user]["nt_hash"], ) - self.add_extracted_creds_to_exploiter_options( - user, - self._extracted_creds[user]["lm_hash"], - self._extracted_creds[user]["nt_hash"], - ) def send_extracted_creds_as_credential_telemetry( self, user: str, lmhash: str, nthash: str @@ -288,17 +283,6 @@ class ZerologonExploiter(HostExploiter): CredentialsTelem([Credentials([Username(user)], [LMHash(lmhash), NTHash(nthash)])]) ) - # so other exploiters can use these creds - def add_extracted_creds_to_exploiter_options(self, user: str, lmhash: str, nthash: str) -> None: - if user not in self.options["credentials"]["exploit_user_list"]: - self.options["credentials"]["exploit_user_list"].append(user) - - if lmhash not in self.options["credentials"]["exploit_lm_hash_list"]: - self.options["credentials"]["exploit_lm_hash_list"].append(lmhash) - - if nthash not in self.options["credentials"]["exploit_ntlm_hash_list"]: - self.options["credentials"]["exploit_ntlm_hash_list"].append(nthash) - def get_original_pwd_nthash(self, username: str, user_pwd_hashes: List[str]) -> str: if not self.save_HKLM_keys_locally(username, user_pwd_hashes): return