forked from p15670423/monkey
agent: Update exploited service name in powershell remoting exploiter
This commit is contained in:
parent
2b71fb80c7
commit
5419200d61
|
@ -28,7 +28,7 @@ class PowershellExploiter(HostExploiter):
|
|||
# attack URLs
|
||||
_TARGET_OS_TYPE = ["windows"]
|
||||
EXPLOIT_TYPE = ExploitType.BRUTE_FORCE
|
||||
_EXPLOITED_SERVICE = "Powershell remote"
|
||||
_EXPLOITED_SERVICE = "PowerShell Remoting (WinRM)"
|
||||
|
||||
def __init__(self, host: VictimHost):
|
||||
# If pysrp will inherit root logger, it will log extensive and potentially sensitive info
|
||||
|
|
Loading…
Reference in New Issue