forked from p15670423/monkey
cc: reword zerologon exploiter class info
This commit is contained in:
parent
9e3fe03ce1
commit
ac530b2555
|
@ -132,11 +132,11 @@ EXPLOITER_CLASSES = {
|
|||
"info": "Exploits a privilege escalation vulnerability (CVE-2020-1472) in a Windows "
|
||||
"server domain controller by using the Netlogon Remote Protocol (MS-NRPC). "
|
||||
"This exploiter changes the password of a Windows server domain controller "
|
||||
"account and could prevent the victim domain controller from communicating "
|
||||
"with other domain controllers. While it attempts to undo "
|
||||
"its changes and reset the password back to the original after the "
|
||||
"vulnerability is exploited, this is not successful in all cases. For "
|
||||
"instructions on how to reset the domain controller's password, see the documentation.",
|
||||
"account and then attempts to restore it. The victim domain controller "
|
||||
"will be unable to communicate with other domain controllers until the original "
|
||||
"password has been restored. If Infection Monkey fails to restore the "
|
||||
"password automatically, you'll have to do it manually. For more "
|
||||
"information, see the documentation.",
|
||||
"link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/",
|
||||
},
|
||||
],
|
||||
|
|
Loading…
Reference in New Issue