diff --git a/monkey/infection_monkey/exploit/powershell.py b/monkey/infection_monkey/exploit/powershell.py index 324ed0495..23c5cb39e 100644 --- a/monkey/infection_monkey/exploit/powershell.py +++ b/monkey/infection_monkey/exploit/powershell.py @@ -52,10 +52,10 @@ class PowerShellExploiter(HostExploiter): return False credentials = get_credentials( - self._config.exploit_user_list, - self._config.exploit_password_list, - self._config.exploit_lm_hash_list, - self._config.exploit_ntlm_hash_list, + self.options["credentials"]["exploit_user_list"], + self.options["credentials"]["exploit_password_list"], + self.options["credentials"]["exploit_lm_hash_list"], + self.options["credentials"]["exploit_ntlm_hash_list"], is_windows_os(), ) auth_options = [get_auth_options(creds, use_ssl) for creds in credentials] @@ -155,7 +155,7 @@ class PowerShellExploiter(HostExploiter): monkey_path_on_victim = ( self._config.dropper_target_path_win_32 if self.is_32bit - else self._config.dropper_target_path_win_64 + else self.options["dropper_target_path_win_64"] ) is_monkey_copy_successful = self._copy_monkey_binary_to_victim(monkey_path_on_victim)