Reword exploiter description

Co-authored-by: Mike Salvatore <mike.s.salvatore@gmail.com>
This commit is contained in:
Shreya Malviya 2021-02-24 16:18:58 +05:30 committed by GitHub
parent 28edf7d2b7
commit 43cac3568b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 5 additions and 4 deletions

View File

@ -156,10 +156,11 @@ EXPLOITER_CLASSES = {
], ],
"title": "Zerologon Exploiter", "title": "Zerologon Exploiter",
"safe": False, "safe": False,
"info": "CVE-2020-1472. Unsafe exploiter (changes the password of a Windows server domain controller account and " "info": "Exploits a privilege escalation vulnerability (CVE-2020-1472) in a Windows "
"might break communication with other domain controllers.) " "server domain controller by using the Netlogon Remote Protocol (MS-NRPC). "
"Exploits a privilege escalation vulnerability in a Windows server domain controller, " "This exploiter changes the password of a Windows server domain controller "
"using the Netlogon Remote Protocol (MS-NRPC).", "account and could prevent the victim domain controller from communicating "
"with other domain controllers.",
"link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/" "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/"
} }
] ]