forked from p15670423/monkey
agent: Update exploited service name in powershell remoting exploiter
This commit is contained in:
parent
2b71fb80c7
commit
5419200d61
|
@ -28,7 +28,7 @@ class PowershellExploiter(HostExploiter):
|
||||||
# attack URLs
|
# attack URLs
|
||||||
_TARGET_OS_TYPE = ["windows"]
|
_TARGET_OS_TYPE = ["windows"]
|
||||||
EXPLOIT_TYPE = ExploitType.BRUTE_FORCE
|
EXPLOIT_TYPE = ExploitType.BRUTE_FORCE
|
||||||
_EXPLOITED_SERVICE = "Powershell remote"
|
_EXPLOITED_SERVICE = "PowerShell Remoting (WinRM)"
|
||||||
|
|
||||||
def __init__(self, host: VictimHost):
|
def __init__(self, host: VictimHost):
|
||||||
# If pysrp will inherit root logger, it will log extensive and potentially sensitive info
|
# If pysrp will inherit root logger, it will log extensive and potentially sensitive info
|
||||||
|
|
Loading…
Reference in New Issue