cc,agent: rename password_restore_success -> password_restored

This commit is contained in:
Mike Salvatore 2021-02-24 17:26:31 -05:00
parent 70fd7d7bb0
commit f17c08d286
2 changed files with 4 additions and 4 deletions

View File

@ -38,7 +38,7 @@ class ZerologonExploiter(HostExploiter):
super().__init__(host)
self.vulnerable_port = None
self.exploit_info["credentials"] = {}
self.exploit_info["password_restore_success"] = None
self.exploit_info["password_restored"] = None
self._extracted_creds = {}
def _exploit_host(self) -> bool:
@ -63,11 +63,11 @@ class ZerologonExploiter(HostExploiter):
# Restore DC's original password.
if _exploited:
if self.restore_password():
self.exploit_info["password_restore_success"] = True
self.exploit_info["password_restored"] = True
self.store_extracted_creds_for_exploitation()
LOG.info("System exploited and password restored successfully.")
else:
self.exploit_info["password_restore_success"] = False
self.exploit_info["password_restored"] = False
LOG.info("System exploited but couldn't restore password!")
else:
LOG.info("System was not exploited.")

View File

@ -394,7 +394,7 @@ class ReportService:
def process_zerologon_exploit(exploit):
processed_exploit = ReportService.process_general_exploit(exploit)
processed_exploit['type'] = 'zerologon'
processed_exploit['password_restore_success'] = exploit['data']['info']['password_restore_success']
processed_exploit['password_restored'] = exploit['data']['info']['password_restored']
return processed_exploit
@staticmethod