forked from p15670423/monkey
Rename "WindowsServer" fingerprinter: "Zerologon" makes more sense
This commit is contained in:
parent
900bb7636d
commit
2cc0a159e0
|
@ -12,7 +12,7 @@ from infection_monkey.network.HostFinger import HostFinger
|
||||||
LOG = logging.getLogger(__name__)
|
LOG = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
class WindowsServerFinger(HostFinger):
|
class ZerologonFinger(HostFinger):
|
||||||
# Class related consts
|
# Class related consts
|
||||||
MAX_ATTEMPTS = 2000
|
MAX_ATTEMPTS = 2000
|
||||||
_SCANNED_SERVICE = "NTLM (NT LAN Manager)"
|
_SCANNED_SERVICE = "NTLM (NT LAN Manager)"
|
|
@ -75,9 +75,9 @@ FINGER_CLASSES = {
|
||||||
{
|
{
|
||||||
"type": "string",
|
"type": "string",
|
||||||
"enum": [
|
"enum": [
|
||||||
"WindowsServerFinger"
|
"ZerologonFinger"
|
||||||
],
|
],
|
||||||
"title": "WindowsServerFinger",
|
"title": "ZerologonFinger",
|
||||||
"safe": True,
|
"safe": True,
|
||||||
"info": "Checks if server is a Windows Server and tests if it is vulnerable to Zerologon.",
|
"info": "Checks if server is a Windows Server and tests if it is vulnerable to Zerologon.",
|
||||||
"attack_techniques": ["T1210"]
|
"attack_techniques": ["T1210"]
|
||||||
|
|
|
@ -223,7 +223,7 @@ INTERNAL = {
|
||||||
"MySQLFinger",
|
"MySQLFinger",
|
||||||
"MSSQLFinger",
|
"MSSQLFinger",
|
||||||
"ElasticFinger",
|
"ElasticFinger",
|
||||||
"WindowsServerFinger"
|
"ZerologonFinger"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue