From 7155896caa9c449a21273f8b13de88a217bb7240 Mon Sep 17 00:00:00 2001 From: Shreya Malviya Date: Fri, 11 Mar 2022 17:23:20 +0530 Subject: [PATCH] Agent: Remove PowerShell exploiter's dependency on WormConfiguration --- monkey/infection_monkey/exploit/powershell.py | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/monkey/infection_monkey/exploit/powershell.py b/monkey/infection_monkey/exploit/powershell.py index 324ed0495..23c5cb39e 100644 --- a/monkey/infection_monkey/exploit/powershell.py +++ b/monkey/infection_monkey/exploit/powershell.py @@ -52,10 +52,10 @@ class PowerShellExploiter(HostExploiter): return False credentials = get_credentials( - self._config.exploit_user_list, - self._config.exploit_password_list, - self._config.exploit_lm_hash_list, - self._config.exploit_ntlm_hash_list, + self.options["credentials"]["exploit_user_list"], + self.options["credentials"]["exploit_password_list"], + self.options["credentials"]["exploit_lm_hash_list"], + self.options["credentials"]["exploit_ntlm_hash_list"], is_windows_os(), ) auth_options = [get_auth_options(creds, use_ssl) for creds in credentials] @@ -155,7 +155,7 @@ class PowerShellExploiter(HostExploiter): monkey_path_on_victim = ( self._config.dropper_target_path_win_32 if self.is_32bit - else self._config.dropper_target_path_win_64 + else self.options["dropper_target_path_win_64"] ) is_monkey_copy_successful = self._copy_monkey_binary_to_victim(monkey_path_on_victim)