forked from p15670423/monkey
cc,agent: rename password_restore_success -> password_restored
This commit is contained in:
parent
70fd7d7bb0
commit
f17c08d286
|
@ -38,7 +38,7 @@ class ZerologonExploiter(HostExploiter):
|
|||
super().__init__(host)
|
||||
self.vulnerable_port = None
|
||||
self.exploit_info["credentials"] = {}
|
||||
self.exploit_info["password_restore_success"] = None
|
||||
self.exploit_info["password_restored"] = None
|
||||
self._extracted_creds = {}
|
||||
|
||||
def _exploit_host(self) -> bool:
|
||||
|
@ -63,11 +63,11 @@ class ZerologonExploiter(HostExploiter):
|
|||
# Restore DC's original password.
|
||||
if _exploited:
|
||||
if self.restore_password():
|
||||
self.exploit_info["password_restore_success"] = True
|
||||
self.exploit_info["password_restored"] = True
|
||||
self.store_extracted_creds_for_exploitation()
|
||||
LOG.info("System exploited and password restored successfully.")
|
||||
else:
|
||||
self.exploit_info["password_restore_success"] = False
|
||||
self.exploit_info["password_restored"] = False
|
||||
LOG.info("System exploited but couldn't restore password!")
|
||||
else:
|
||||
LOG.info("System was not exploited.")
|
||||
|
|
|
@ -394,7 +394,7 @@ class ReportService:
|
|||
def process_zerologon_exploit(exploit):
|
||||
processed_exploit = ReportService.process_general_exploit(exploit)
|
||||
processed_exploit['type'] = 'zerologon'
|
||||
processed_exploit['password_restore_success'] = exploit['data']['info']['password_restore_success']
|
||||
processed_exploit['password_restored'] = exploit['data']['info']['password_restored']
|
||||
return processed_exploit
|
||||
|
||||
@staticmethod
|
||||
|
|
Loading…
Reference in New Issue