agent: Update exploited service name in powershell remoting exploiter

This commit is contained in:
Shreya Malviya 2021-08-20 19:41:18 +05:30
parent 2b71fb80c7
commit 5419200d61
1 changed files with 1 additions and 1 deletions

View File

@ -28,7 +28,7 @@ class PowershellExploiter(HostExploiter):
# attack URLs # attack URLs
_TARGET_OS_TYPE = ["windows"] _TARGET_OS_TYPE = ["windows"]
EXPLOIT_TYPE = ExploitType.BRUTE_FORCE EXPLOIT_TYPE = ExploitType.BRUTE_FORCE
_EXPLOITED_SERVICE = "Powershell remote" _EXPLOITED_SERVICE = "PowerShell Remoting (WinRM)"
def __init__(self, host: VictimHost): def __init__(self, host: VictimHost):
# If pysrp will inherit root logger, it will log extensive and potentially sensitive info # If pysrp will inherit root logger, it will log extensive and potentially sensitive info