monkey/infection_monkey/example.conf

96 lines
2.8 KiB
Plaintext
Raw Normal View History

2015-12-07 16:15:56 +08:00
{
"command_servers": [
"192.0.2.0:5000"
],
2016-08-01 01:40:45 +08:00
"internet_services": [
"monkey.guardicore.com",
"www.google.com"
],
2017-10-03 20:47:50 +08:00
"keep_tunnel_open_time": 60,
2018-02-26 22:34:23 +08:00
"subnet_scan_list": [
2018-06-13 21:05:12 +08:00
],
2018-06-13 21:05:12 +08:00
"blocked_ips": [],
"current_server": "192.0.2.0:5000",
"alive": true,
"collect_system_info": true,
"extract_azure_creds": true,
2016-08-01 01:40:45 +08:00
"depth": 2,
2017-09-27 16:24:42 +08:00
"dropper_date_reference_path_windows": "%windir%\\system32\\kernel32.dll",
"dropper_date_reference_path_linux": "/bin/sh",
"dropper_log_path_windows": "%temp%\\~df1562.tmp",
"dropper_log_path_linux": "/tmp/user-1562",
2015-12-07 16:15:56 +08:00
"dropper_set_date": true,
"dropper_target_path_win_32": "C:\\Windows\\monkey32.exe",
"dropper_target_path_win_64": "C:\\Windows\\monkey64.exe",
"dropper_target_path_linux": "/tmp/monkey",
"kill_file_path_linux": "/var/run/monkey.not",
"kill_file_path_windows": "%windir%\\monkey.not",
"dropper_try_move_first": true,
2015-12-07 16:15:56 +08:00
"exploiter_classes": [
"SSHExploiter",
"SmbExploiter",
"WmiExploiter",
2017-09-26 20:43:46 +08:00
"ShellShockExploiter",
"ElasticGroovyExploiter",
"SambaCryExploiter",
"Struts2Exploiter"
2015-12-07 16:15:56 +08:00
],
"finger_classes": [
"SSHFinger",
"PingScanner",
2016-09-01 18:58:44 +08:00
"HTTPFinger",
"SMBFinger",
"MySQLFinger",
"MSSQLFingerprint",
"ElasticFinger"
2015-12-07 16:15:56 +08:00
],
"max_iterations": 3,
"monkey_log_path_windows": "%temp%\\~df1563.tmp",
"monkey_log_path_linux": "/tmp/user-1563",
2018-02-20 00:32:05 +08:00
"send_log_to_server": true,
2015-12-07 16:15:56 +08:00
"ms08_067_exploit_attempts": 5,
"ms08_067_remote_user_add": "Monkey_IUSER_SUPPORT",
2015-12-07 16:15:56 +08:00
"ms08_067_remote_user_pass": "Password1!",
"ping_scan_timeout": 10000,
"rdp_use_vbs_download": true,
"smb_download_timeout": 300,
"smb_service_name": "InfectionMonkey",
2015-12-07 16:15:56 +08:00
"retry_failed_explotation": true,
"scanner_class": "TcpScanner",
2016-08-01 01:40:45 +08:00
"self_delete_in_cleanup": true,
2016-07-23 13:59:26 +08:00
"serialize_config": false,
2015-12-07 16:15:56 +08:00
"singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}",
"skip_exploit_if_file_exist": false,
"exploit_user_list": [],
2017-09-05 22:51:26 +08:00
"exploit_password_list": [],
2017-09-26 23:11:13 +08:00
"exploit_lm_hash_list": [],
"exploit_ntlm_hash_list": [],
"exploit_ssh_keys": [],
2017-09-05 22:51:26 +08:00
"sambacry_trigger_timeout": 5,
"sambacry_folder_paths_to_guess": ["", "/mnt", "/tmp", "/storage", "/export", "/share", "/shares", "/home"],
"sambacry_shares_not_to_check": ["IPC$", "print$"],
"local_network_scan": false,
2015-12-07 16:15:56 +08:00
"tcp_scan_get_banner": true,
"tcp_scan_interval": 200,
"tcp_scan_timeout": 10000,
"tcp_target_ports": [
22,
445,
135,
3389,
80,
8080,
443,
3306,
2017-09-25 20:13:36 +08:00
8008,
9200
2015-12-07 16:15:56 +08:00
],
"timeout_between_iterations": 10,
"use_file_logging": true,
"victims_max_exploit": 7,
"victims_max_find": 30
}