diff --git a/monkey/infection_monkey/network/windowsserver_fingerprint.py b/monkey/infection_monkey/network/zerologon_fingerprint.py similarity index 98% rename from monkey/infection_monkey/network/windowsserver_fingerprint.py rename to monkey/infection_monkey/network/zerologon_fingerprint.py index 3bb1a8450..bf14a5dc9 100644 --- a/monkey/infection_monkey/network/windowsserver_fingerprint.py +++ b/monkey/infection_monkey/network/zerologon_fingerprint.py @@ -12,7 +12,7 @@ from infection_monkey.network.HostFinger import HostFinger LOG = logging.getLogger(__name__) -class WindowsServerFinger(HostFinger): +class ZerologonFinger(HostFinger): # Class related consts MAX_ATTEMPTS = 2000 _SCANNED_SERVICE = "NTLM (NT LAN Manager)" diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py index 5e3f75f33..f7de38cc7 100644 --- a/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py +++ b/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py @@ -75,9 +75,9 @@ FINGER_CLASSES = { { "type": "string", "enum": [ - "WindowsServerFinger" + "ZerologonFinger" ], - "title": "WindowsServerFinger", + "title": "ZerologonFinger", "safe": True, "info": "Checks if server is a Windows Server and tests if it is vulnerable to Zerologon.", "attack_techniques": ["T1210"] diff --git a/monkey/monkey_island/cc/services/config_schema/internal.py b/monkey/monkey_island/cc/services/config_schema/internal.py index fae309ad5..edd568db0 100644 --- a/monkey/monkey_island/cc/services/config_schema/internal.py +++ b/monkey/monkey_island/cc/services/config_schema/internal.py @@ -223,7 +223,7 @@ INTERNAL = { "MySQLFinger", "MSSQLFinger", "ElasticFinger", - "WindowsServerFinger" + "ZerologonFinger" ] } }