forked from p15670423/monkey
Reword exploiter description
Co-authored-by: Mike Salvatore <mike.s.salvatore@gmail.com>
This commit is contained in:
parent
28edf7d2b7
commit
43cac3568b
|
@ -156,10 +156,11 @@ EXPLOITER_CLASSES = {
|
|||
],
|
||||
"title": "Zerologon Exploiter",
|
||||
"safe": False,
|
||||
"info": "CVE-2020-1472. Unsafe exploiter (changes the password of a Windows server domain controller account and "
|
||||
"might break communication with other domain controllers.) "
|
||||
"Exploits a privilege escalation vulnerability in a Windows server domain controller, "
|
||||
"using the Netlogon Remote Protocol (MS-NRPC).",
|
||||
"info": "Exploits a privilege escalation vulnerability (CVE-2020-1472) in a Windows "
|
||||
"server domain controller by using the Netlogon Remote Protocol (MS-NRPC). "
|
||||
"This exploiter changes the password of a Windows server domain controller "
|
||||
"account and could prevent the victim domain controller from communicating "
|
||||
"with other domain controllers.",
|
||||
"link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/"
|
||||
}
|
||||
]
|
||||
|
|
Loading…
Reference in New Issue