diff --git a/monkey/monkey_island/cc/services/config_schema/basic.py b/monkey/monkey_island/cc/services/config_schema/basic.py index ec01f8899..0fa0b80d4 100644 --- a/monkey/monkey_island/cc/services/config_schema/basic.py +++ b/monkey/monkey_island/cc/services/config_schema/basic.py @@ -27,8 +27,7 @@ BASIC = { "HadoopExploiter", "VSFTPDExploiter", "MSSQLExploiter", - "DrupalExploiter", - "ZerologonExploiter" + "DrupalExploiter" ] } } diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py index 221873fe8..32a99026d 100644 --- a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py +++ b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py @@ -154,7 +154,8 @@ EXPLOITER_CLASSES = { "enum": [ "ZerologonExploiter" ], - "title": "Zerologon Exploiter (UNSAFE)", + "title": "Zerologon Exploiter", + "safe": False, "info": "CVE-2020-1472. Unsafe exploiter (changes the password of a Windows server domain controller account and " "might break communication with other domain controllers.) " "Exploits a privilege escalation vulnerability in a Windows server domain controller, "