diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py index 32a99026d..ecc9b0029 100644 --- a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py +++ b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py @@ -156,10 +156,11 @@ EXPLOITER_CLASSES = { ], "title": "Zerologon Exploiter", "safe": False, - "info": "CVE-2020-1472. Unsafe exploiter (changes the password of a Windows server domain controller account and " - "might break communication with other domain controllers.) " - "Exploits a privilege escalation vulnerability in a Windows server domain controller, " - "using the Netlogon Remote Protocol (MS-NRPC).", + "info": "Exploits a privilege escalation vulnerability (CVE-2020-1472) in a Windows " + "server domain controller by using the Netlogon Remote Protocol (MS-NRPC). " + "This exploiter changes the password of a Windows server domain controller " + "account and could prevent the victim domain controller from communicating " + "with other domain controllers.", "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/" } ]