diff --git a/monkey/infection_monkey/exploit/zerologon.py b/monkey/infection_monkey/exploit/zerologon.py index 4c1374760..0b518a50a 100644 --- a/monkey/infection_monkey/exploit/zerologon.py +++ b/monkey/infection_monkey/exploit/zerologon.py @@ -74,8 +74,8 @@ class ZerologonExploiter(HostExploiter): def _exploit_host(self) -> ExploiterResultData: self.dc_ip, self.dc_name, self.dc_handle = get_dc_details(self.host) - can_exploit, rpc_con = self.is_exploitable() - if can_exploit: + authenticated, rpc_con = self.authenticate() + if authenticated: logger.info("Target vulnerable, changing account password to empty string.") if self._is_interrupted(): @@ -112,7 +112,7 @@ class ZerologonExploiter(HostExploiter): return self.exploit_result - def is_exploitable(self) -> Tuple[bool, Optional[rpcrt.DCERPC_v5]]: + def authenticate(self) -> Tuple[bool, Optional[rpcrt.DCERPC_v5]]: """ Attempt to authenticate with the domain controller