From ba8c44d22c6a33cbec2e7ad7e12edb3019e99d24 Mon Sep 17 00:00:00 2001 From: Shreya Malviya Date: Fri, 20 Aug 2021 20:29:32 +0530 Subject: [PATCH] agent: Fix typos in powershell remoting exploiter --- monkey/infection_monkey/exploit/powershell.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/monkey/infection_monkey/exploit/powershell.py b/monkey/infection_monkey/exploit/powershell.py index 15d51bdb3..a3328bccd 100644 --- a/monkey/infection_monkey/exploit/powershell.py +++ b/monkey/infection_monkey/exploit/powershell.py @@ -31,7 +31,7 @@ class PowershellExploiter(HostExploiter): _EXPLOITED_SERVICE = "PowerShell Remoting (WinRM)" def __init__(self, host: VictimHost): - # If pysrp will inherit root logger, it will log extensive and potentially sensitive info + # If pypsrp will inherit root logger, it will log extensive and potentially sensitive info logging.getLogger("pypsrp").setLevel(logging.ERROR) logging.getLogger(spnego.__name__).setLevel(logging.ERROR) logging.getLogger(connectionpool.__name__).setLevel(logging.ERROR) @@ -55,7 +55,7 @@ class PowershellExploiter(HostExploiter): self._config.get_exploit_user_password_pairs() ) except FailedExploitationError: - LOG.info("Failed exploitation using credentials from configuration. Quiting.") + LOG.info("Failed exploitation using credentials from configuration. Quitting.") return False arch = self.get_host_arch()