forked from p15670423/monkey
Rename "WindowsServer" fingerprinter: "Zerologon" makes more sense
This commit is contained in:
parent
900bb7636d
commit
2cc0a159e0
|
@ -12,7 +12,7 @@ from infection_monkey.network.HostFinger import HostFinger
|
|||
LOG = logging.getLogger(__name__)
|
||||
|
||||
|
||||
class WindowsServerFinger(HostFinger):
|
||||
class ZerologonFinger(HostFinger):
|
||||
# Class related consts
|
||||
MAX_ATTEMPTS = 2000
|
||||
_SCANNED_SERVICE = "NTLM (NT LAN Manager)"
|
|
@ -75,9 +75,9 @@ FINGER_CLASSES = {
|
|||
{
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"WindowsServerFinger"
|
||||
"ZerologonFinger"
|
||||
],
|
||||
"title": "WindowsServerFinger",
|
||||
"title": "ZerologonFinger",
|
||||
"safe": True,
|
||||
"info": "Checks if server is a Windows Server and tests if it is vulnerable to Zerologon.",
|
||||
"attack_techniques": ["T1210"]
|
||||
|
|
|
@ -223,7 +223,7 @@ INTERNAL = {
|
|||
"MySQLFinger",
|
||||
"MSSQLFinger",
|
||||
"ElasticFinger",
|
||||
"WindowsServerFinger"
|
||||
"ZerologonFinger"
|
||||
]
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue