cc: reword zerologon exploiter class info

This commit is contained in:
Mike Salvatore 2021-03-01 10:35:04 -05:00
parent 9e3fe03ce1
commit ac530b2555
1 changed files with 5 additions and 5 deletions

View File

@ -132,11 +132,11 @@ EXPLOITER_CLASSES = {
"info": "Exploits a privilege escalation vulnerability (CVE-2020-1472) in a Windows "
"server domain controller by using the Netlogon Remote Protocol (MS-NRPC). "
"This exploiter changes the password of a Windows server domain controller "
"account and could prevent the victim domain controller from communicating "
"with other domain controllers. While it attempts to undo "
"its changes and reset the password back to the original after the "
"vulnerability is exploited, this is not successful in all cases. For "
"instructions on how to reset the domain controller's password, see the documentation.",
"account and then attempts to restore it. The victim domain controller "
"will be unable to communicate with other domain controllers until the original "
"password has been restored. If Infection Monkey fails to restore the "
"password automatically, you'll have to do it manually. For more "
"information, see the documentation.",
"link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/",
},
],