Browse Source

rename attack types

aidmar.wainakh 6 years ago
parent
commit
a1cf8ab2de

+ 2 - 2
code/Attack/EternalBlueExploit.py

@@ -29,7 +29,7 @@ class EternalBlueExploit(BaseAttack.BaseAttack):
         """
         # Initialize attack
         super(EternalBlueExploit, self).__init__("EternalBlue Exploit", "Injects an EternalBlue exploit'",
-                                        "Resource Exhaustion")
+                                        "Privilege elevation")
 
         # Define allowed parameters and their type
         self.supported_params = {
@@ -186,7 +186,7 @@ class EternalBlueExploit(BaseAttack.BaseAttack):
                 # TCP
                 tcp_pkt.setfieldval("sport",port_source)
                 tcp_pkt.setfieldval("dport",port_destination)
-                ## Window Size
+                ## Window Size (mapping)
                 source_origin_win = tcp_pkt.getfieldval("window")
                 if source_origin_win not in source_origin_wins:
                     source_origin_wins[source_origin_win] = source_win_prob_dict.random()

+ 1 - 1
code/Attack/JoomlaRegPrivExploit.py

@@ -28,7 +28,7 @@ class JoomlaRegPrivExploit(BaseAttack.BaseAttack):
         """
         # Initialize attack
         super(JoomlaRegPrivExploit, self).__init__("JoomlaRegPrivesc Exploit", "Injects an JoomlaRegPrivesc exploit'",
-                                        "Resource Exhaustion")
+                                        "Privilege elevation")
 
         # Define allowed parameters and their type
         self.supported_params = {

+ 1 - 1
code/Attack/SQLiAttack.py

@@ -28,7 +28,7 @@ class SQLiAttack(BaseAttack.BaseAttack):
         """
         # Initialize attack
         super(SQLiAttack, self).__init__("SQLi Attack", "Injects a SQLi attack'",
-                                        "Resource Exhaustion")
+                                        "Privilege elevation")
 
         # Define allowed parameters and their type
         self.supported_params = {