forked from p15670423/monkey
Agent: Remove disused RUNS_AGENT_ON_SUCCESS
This commit is contained in:
parent
7a8442b331
commit
9976b8b044
|
@ -16,12 +16,6 @@ logger = logging.getLogger(__name__)
|
||||||
class HostExploiter:
|
class HostExploiter:
|
||||||
_TARGET_OS_TYPE = []
|
_TARGET_OS_TYPE = []
|
||||||
|
|
||||||
# Determines if successful exploitation should stop further exploit attempts on that machine.
|
|
||||||
# Generally, should be True for RCE type exploiters and False if we don't expect the
|
|
||||||
# exploiter to run the monkey agent.
|
|
||||||
# Example: Zerologon steals credentials
|
|
||||||
RUNS_AGENT_ON_SUCCESS = True
|
|
||||||
|
|
||||||
@property
|
@property
|
||||||
@abstractmethod
|
@abstractmethod
|
||||||
def _EXPLOITED_SERVICE(self):
|
def _EXPLOITED_SERVICE(self):
|
||||||
|
|
|
@ -33,7 +33,6 @@ logger = logging.getLogger(__name__)
|
||||||
class ZerologonExploiter(HostExploiter):
|
class ZerologonExploiter(HostExploiter):
|
||||||
_TARGET_OS_TYPE = ["windows"]
|
_TARGET_OS_TYPE = ["windows"]
|
||||||
_EXPLOITED_SERVICE = "Netlogon"
|
_EXPLOITED_SERVICE = "Netlogon"
|
||||||
RUNS_AGENT_ON_SUCCESS = False
|
|
||||||
MAX_ATTEMPTS = 2000 # For 2000, expected average number of attempts needed: 256.
|
MAX_ATTEMPTS = 2000 # For 2000, expected average number of attempts needed: 256.
|
||||||
ERROR_CODE_ACCESS_DENIED = 0xC0000022
|
ERROR_CODE_ACCESS_DENIED = 0xC0000022
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue