diff --git a/monkey/infection_monkey/exploit/powershell.py b/monkey/infection_monkey/exploit/powershell.py index 15d51bdb3..a3328bccd 100644 --- a/monkey/infection_monkey/exploit/powershell.py +++ b/monkey/infection_monkey/exploit/powershell.py @@ -31,7 +31,7 @@ class PowershellExploiter(HostExploiter): _EXPLOITED_SERVICE = "PowerShell Remoting (WinRM)" def __init__(self, host: VictimHost): - # If pysrp will inherit root logger, it will log extensive and potentially sensitive info + # If pypsrp will inherit root logger, it will log extensive and potentially sensitive info logging.getLogger("pypsrp").setLevel(logging.ERROR) logging.getLogger(spnego.__name__).setLevel(logging.ERROR) logging.getLogger(connectionpool.__name__).setLevel(logging.ERROR) @@ -55,7 +55,7 @@ class PowershellExploiter(HostExploiter): self._config.get_exploit_user_password_pairs() ) except FailedExploitationError: - LOG.info("Failed exploitation using credentials from configuration. Quiting.") + LOG.info("Failed exploitation using credentials from configuration. Quitting.") return False arch = self.get_host_arch()