From 74088c81437d06fb938dc3e6da559d51681ed863 Mon Sep 17 00:00:00 2001 From: Kekoa Kaaikala Date: Fri, 7 Oct 2022 19:50:21 +0000 Subject: [PATCH] Agent: Rename is_exploitable to authenticate --- monkey/infection_monkey/exploit/zerologon.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/monkey/infection_monkey/exploit/zerologon.py b/monkey/infection_monkey/exploit/zerologon.py index 4c1374760..0b518a50a 100644 --- a/monkey/infection_monkey/exploit/zerologon.py +++ b/monkey/infection_monkey/exploit/zerologon.py @@ -74,8 +74,8 @@ class ZerologonExploiter(HostExploiter): def _exploit_host(self) -> ExploiterResultData: self.dc_ip, self.dc_name, self.dc_handle = get_dc_details(self.host) - can_exploit, rpc_con = self.is_exploitable() - if can_exploit: + authenticated, rpc_con = self.authenticate() + if authenticated: logger.info("Target vulnerable, changing account password to empty string.") if self._is_interrupted(): @@ -112,7 +112,7 @@ class ZerologonExploiter(HostExploiter): return self.exploit_result - def is_exploitable(self) -> Tuple[bool, Optional[rpcrt.DCERPC_v5]]: + def authenticate(self) -> Tuple[bool, Optional[rpcrt.DCERPC_v5]]: """ Attempt to authenticate with the domain controller