2015-12-07 16:15:56 +08:00
|
|
|
{
|
|
|
|
"command_servers": [
|
2016-07-10 16:41:13 +08:00
|
|
|
"41.50.73.31:5000"
|
|
|
|
],
|
2016-08-01 01:40:45 +08:00
|
|
|
"internet_services": [
|
2016-07-10 16:47:07 +08:00
|
|
|
"monkey.guardicore.com",
|
2016-07-10 16:41:13 +08:00
|
|
|
"www.google.com"
|
|
|
|
],
|
|
|
|
"range_class": "RelativeRange",
|
|
|
|
"range_fixed": [
|
|
|
|
""
|
|
|
|
],
|
|
|
|
"current_server": "41.50.73.31:5000",
|
|
|
|
"psexec_passwords": [
|
|
|
|
"Password1!",
|
|
|
|
"1234",
|
|
|
|
"password",
|
|
|
|
"12345678"
|
|
|
|
],
|
|
|
|
"ssh_passwords": [
|
|
|
|
"Password1!",
|
|
|
|
"Password",
|
|
|
|
"1234",
|
|
|
|
"12345",
|
|
|
|
"123",
|
|
|
|
"password",
|
|
|
|
"12345678"
|
2015-12-07 16:15:56 +08:00
|
|
|
],
|
2016-07-10 16:41:13 +08:00
|
|
|
"alive": true,
|
|
|
|
"collect_system_info": true,
|
2016-08-01 01:40:45 +08:00
|
|
|
"depth": 2,
|
|
|
|
|
2015-12-07 16:15:56 +08:00
|
|
|
"dropper_date_reference_path": "/bin/sh",
|
2016-03-02 23:13:36 +08:00
|
|
|
"dropper_log_path_windows": "%temp%\\~df1562.tmp",
|
|
|
|
"dropper_log_path_linux": "/tmp/user-1562",
|
2015-12-07 16:15:56 +08:00
|
|
|
"dropper_set_date": true,
|
|
|
|
"dropper_target_path": "C:\\Windows\\monkey.exe",
|
|
|
|
"dropper_target_path_linux": "/bin/monkey",
|
2016-07-19 04:43:17 +08:00
|
|
|
|
2016-08-03 14:24:55 +08:00
|
|
|
|
|
|
|
"kill_file_path_linux": "/var/run/monkey.not",
|
2016-08-09 03:25:33 +08:00
|
|
|
"kill_file_path_windows": "%windir%\\monkey.not",
|
2015-12-07 16:15:56 +08:00
|
|
|
"dropper_try_move_first": false,
|
|
|
|
"exploiter_classes": [
|
|
|
|
"SSHExploiter",
|
|
|
|
"SmbExploiter",
|
|
|
|
"WmiExploiter",
|
|
|
|
"RdpExploiter",
|
|
|
|
"Ms08_067_Exploiter"
|
|
|
|
],
|
|
|
|
"finger_classes": [
|
|
|
|
"SSHFinger",
|
|
|
|
"PingScanner",
|
|
|
|
"SMBFinger"
|
|
|
|
],
|
|
|
|
"max_iterations": 3,
|
2016-03-02 23:13:36 +08:00
|
|
|
"monkey_log_path_windows": "%temp%\\~df1563.tmp",
|
|
|
|
"monkey_log_path_linux": "/tmp/user-1563",
|
2015-12-07 16:15:56 +08:00
|
|
|
"ms08_067_exploit_attempts": 5,
|
2016-06-14 22:06:17 +08:00
|
|
|
"ms08_067_remote_user_add": "Monkey_IUSER_SUPPORT",
|
2015-12-07 16:15:56 +08:00
|
|
|
"ms08_067_remote_user_pass": "Password1!",
|
|
|
|
"ping_scan_timeout": 10000,
|
|
|
|
"psexec_user": "Administrator",
|
|
|
|
"range_size": 30,
|
|
|
|
"rdp_use_vbs_download": true,
|
|
|
|
"retry_failed_explotation": true,
|
|
|
|
"scanner_class": "TcpScanner",
|
2016-08-01 01:40:45 +08:00
|
|
|
"self_delete_in_cleanup": true,
|
2016-07-23 13:59:26 +08:00
|
|
|
"serialize_config": false,
|
2015-12-07 16:15:56 +08:00
|
|
|
"singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}",
|
|
|
|
"skip_exploit_if_file_exist": true,
|
2016-08-13 23:30:24 +08:00
|
|
|
"ssh_users": [
|
2016-08-09 03:25:33 +08:00
|
|
|
"root"
|
|
|
|
],
|
2016-07-15 22:00:55 +08:00
|
|
|
"local_network_scan": true,
|
2015-12-07 16:15:56 +08:00
|
|
|
"tcp_scan_get_banner": true,
|
|
|
|
"tcp_scan_interval": 200,
|
|
|
|
"tcp_scan_timeout": 10000,
|
|
|
|
"tcp_target_ports": [
|
|
|
|
22,
|
|
|
|
445,
|
|
|
|
135,
|
|
|
|
3389
|
|
|
|
],
|
|
|
|
"timeout_between_iterations": 10,
|
|
|
|
"use_file_logging": true,
|
|
|
|
"victims_max_exploit": 7,
|
|
|
|
"victims_max_find": 14
|
|
|
|
}
|