Reword exploiter description

Co-authored-by: Mike Salvatore <mike.s.salvatore@gmail.com>
This commit is contained in:
Shreya Malviya 2021-02-24 16:18:58 +05:30 committed by GitHub
parent 28edf7d2b7
commit 43cac3568b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 5 additions and 4 deletions

View File

@ -156,10 +156,11 @@ EXPLOITER_CLASSES = {
],
"title": "Zerologon Exploiter",
"safe": False,
"info": "CVE-2020-1472. Unsafe exploiter (changes the password of a Windows server domain controller account and "
"might break communication with other domain controllers.) "
"Exploits a privilege escalation vulnerability in a Windows server domain controller, "
"using the Netlogon Remote Protocol (MS-NRPC).",
"info": "Exploits a privilege escalation vulnerability (CVE-2020-1472) in a Windows "
"server domain controller by using the Netlogon Remote Protocol (MS-NRPC). "
"This exploiter changes the password of a Windows server domain controller "
"account and could prevent the victim domain controller from communicating "
"with other domain controllers.",
"link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/"
}
]