forked from p15670423/monkey
Changed zerologon links to be more consistent and have a style
This commit is contained in:
parent
b3e9922d0f
commit
8eeed20f7e
|
@ -370,16 +370,23 @@ class ReportPageComponent extends AuthComponent {
|
||||||
if (this.state.report.overview.issues[this.Issue.ZEROLOGON_PASSWORD_RESTORE_FAILED]) {
|
if (this.state.report.overview.issues[this.Issue.ZEROLOGON_PASSWORD_RESTORE_FAILED]) {
|
||||||
zerologonOverview.push(<span>
|
zerologonOverview.push(<span>
|
||||||
<WarningIcon/> Automatic password restoration on a domain controller failed!
|
<WarningIcon/> Automatic password restoration on a domain controller failed!
|
||||||
<Button variant={"link"} href={"#"} target={"_blank"} className={"security-report-link"}>
|
<Button variant={"link"}
|
||||||
Restore your domain controller's password manually.</Button>
|
href={"https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/"}
|
||||||
|
target={"_blank"}
|
||||||
|
className={"security-report-link"}>
|
||||||
|
Restore your domain controller's password manually.
|
||||||
|
</Button>
|
||||||
</span>)
|
</span>)
|
||||||
}
|
}
|
||||||
if(this.state.report.overview.issues[this.Issue.ZEROLOGON]) {
|
if(this.state.report.overview.issues[this.Issue.ZEROLOGON]) {
|
||||||
zerologonOverview.push(<>
|
zerologonOverview.push(<>
|
||||||
Some domain controllers are vulnerable to Zerologon exploiter(
|
Some domain controllers are vulnerable to Zerologon exploiter(
|
||||||
<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472" target={"_blank"}>
|
<Button variant={"link"}
|
||||||
CVE-2020-1472</a>)!
|
href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472"
|
||||||
</>)
|
target={"_blank"}
|
||||||
|
className={"security-report-link"}>
|
||||||
|
CVE-2020-1472</Button>)!
|
||||||
|
</>)
|
||||||
} else {
|
} else {
|
||||||
return none;
|
return none;
|
||||||
}
|
}
|
||||||
|
@ -936,15 +943,28 @@ class ReportPageComponent extends AuthComponent {
|
||||||
<br/>
|
<br/>
|
||||||
The attack was possible because the latest security updates from Microsoft
|
The attack was possible because the latest security updates from Microsoft
|
||||||
have not been applied to this machine. For more information about this
|
have not been applied to this machine. For more information about this
|
||||||
vulnerability, read <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472">
|
vulnerability, read
|
||||||
Microsoft's documentation.</a>
|
<Button
|
||||||
|
variant={"link"}
|
||||||
|
href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472"
|
||||||
|
target={"_blank"}
|
||||||
|
className={"security-report-link"}
|
||||||
|
>
|
||||||
|
Microsoft's documentation.</Button>
|
||||||
{!issue.password_restored ?
|
{!issue.password_restored ?
|
||||||
<div className={'info-pane-warning'} key={'warning'}>
|
<div className={'info-pane-warning'} key={'warning'}>
|
||||||
<br/><WarningIcon/>
|
<br/><WarningIcon/>
|
||||||
<span>
|
<span>
|
||||||
The domain controller's password was changed during the exploit and could not be restored successfully.
|
The domain controller's password was changed during the exploit and could not be restored successfully.
|
||||||
Instructions on how to manually reset the domain controller's password can be found <a
|
Instructions on how to manually reset the domain controller's password can be found
|
||||||
href="https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/">here</a>.
|
<Button
|
||||||
|
variant={"link"}
|
||||||
|
href="https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/"
|
||||||
|
target={"_blank"}
|
||||||
|
className={"security-report-link"}
|
||||||
|
>
|
||||||
|
here
|
||||||
|
</Button>.
|
||||||
</span>
|
</span>
|
||||||
</div> : null}
|
</div> : null}
|
||||||
</CollapsibleWellComponent>
|
</CollapsibleWellComponent>
|
||||||
|
|
Loading…
Reference in New Issue