fix: try/except updating the database on spoolers and zerologon modules
parent
cbd312eb21
commit
e6022139aa
|
@ -92,8 +92,11 @@ class CMEModule:
|
||||||
logging.debug(" %s" % binding)
|
logging.debug(" %s" % binding)
|
||||||
logging.debug("")
|
logging.debug("")
|
||||||
context.log.highlight('Spooler service enabled')
|
context.log.highlight('Spooler service enabled')
|
||||||
host = context.db.get_computers(connection.host)[0]
|
try:
|
||||||
context.db.add_computer(host.ip, host.hostname, host.domain, host.os, host.smbv1, host.signing, spooler=True)
|
host = context.db.get_computers(connection.host)[0]
|
||||||
|
context.db.add_computer(host.ip, host.hostname, host.domain, host.os, host.smbv1, host.signing, spooler=True)
|
||||||
|
except Exception as e:
|
||||||
|
logging.debug(f"Error updating spooler status in database")
|
||||||
break
|
break
|
||||||
|
|
||||||
if entries:
|
if entries:
|
||||||
|
|
|
@ -12,6 +12,7 @@ from impacket import crypto
|
||||||
import hmac, hashlib, struct, sys, socket, time
|
import hmac, hashlib, struct, sys, socket, time
|
||||||
from binascii import hexlify, unhexlify
|
from binascii import hexlify, unhexlify
|
||||||
from subprocess import check_call
|
from subprocess import check_call
|
||||||
|
import logging
|
||||||
|
|
||||||
# Give up brute-forcing after this many attempts. If vulnerable, 256 attempts are expected to be neccessary on average.
|
# Give up brute-forcing after this many attempts. If vulnerable, 256 attempts are expected to be neccessary on average.
|
||||||
MAX_ATTEMPTS = 2000 # False negative chance: 0.04%
|
MAX_ATTEMPTS = 2000 # False negative chance: 0.04%
|
||||||
|
@ -34,8 +35,11 @@ class CMEModule:
|
||||||
if perform_attack('\\\\' + connection.hostname, connection.host, connection.hostname):
|
if perform_attack('\\\\' + connection.hostname, connection.host, connection.hostname):
|
||||||
context.log.highlight("VULNERABLE")
|
context.log.highlight("VULNERABLE")
|
||||||
context.log.highlight("Next step: https://github.com/dirkjanm/CVE-2020-1472")
|
context.log.highlight("Next step: https://github.com/dirkjanm/CVE-2020-1472")
|
||||||
host = context.db.get_computers(connection.host)[0]
|
try:
|
||||||
context.db.add_computer(host.ip, host.hostname, host.domain, host.os, host.smbv1, host.signing, zerologon=True)
|
host = context.db.get_computers(connection.host)[0]
|
||||||
|
context.db.add_computer(host.ip, host.hostname, host.domain, host.os, host.smbv1, host.signing, zerologon=True)
|
||||||
|
except Exception as e:
|
||||||
|
logging.debug(f"Error updating zerologon status in database")
|
||||||
|
|
||||||
|
|
||||||
def fail(msg):
|
def fail(msg):
|
||||||
|
|
Loading…
Reference in New Issue