From 4330a397255e23dec83dae5d8f79660d5769898b Mon Sep 17 00:00:00 2001
From: Shay Nehmad <shay.nehmad@guardicore.com>
Date: Mon, 16 Sep 2019 14:59:27 +0300
Subject: [PATCH] Removed unused PBA processing funcs

---
 .../post_breach/actions/communicate_as_new_user.py           | 2 +-
 .../cc/services/telemetry/processing/post_breach.py          | 5 +----
 2 files changed, 2 insertions(+), 5 deletions(-)

diff --git a/monkey/infection_monkey/post_breach/actions/communicate_as_new_user.py b/monkey/infection_monkey/post_breach/actions/communicate_as_new_user.py
index 5b5117681..1c5dfcf45 100644
--- a/monkey/infection_monkey/post_breach/actions/communicate_as_new_user.py
+++ b/monkey/infection_monkey/post_breach/actions/communicate_as_new_user.py
@@ -108,7 +108,7 @@ class CommunicateAsNewUser(PBA):
                     self.send_ping_result_telemetry(ping_exit_code, commandline, username)
                 except Exception as e:
                     # If failed on 1314, it's possible to try to elevate the rights of the current user with the
-                    #  "Replace a process level token" right, using Local Security Policy editing. 
+                    #  "Replace a process level token" right, using Local Security Policy editing.
                     PostBreachTelem(self, (
                         "Failed to open process as user {}. Error: {}".format(username, str(e)), False)).send()
                 finally:
diff --git a/monkey/monkey_island/cc/services/telemetry/processing/post_breach.py b/monkey/monkey_island/cc/services/telemetry/processing/post_breach.py
index c67f64f59..c64849905 100644
--- a/monkey/monkey_island/cc/services/telemetry/processing/post_breach.py
+++ b/monkey/monkey_island/cc/services/telemetry/processing/post_breach.py
@@ -6,16 +6,13 @@ from monkey_island.cc.services.telemetry.zero_trust_tests.communicate_as_new_use
 
 def process_communicate_as_new_user_telemetry(telemetry_json):
     current_monkey = Monkey.get_single_monkey_by_guid(telemetry_json['monkey_guid'])
-    success = telemetry_json['data']['result'][1]
     message = telemetry_json['data']['result'][0]
+    success = telemetry_json['data']['result'][1]
     test_new_user_communication(current_monkey, success, message)
 
 
 POST_BREACH_TELEMETRY_PROCESSING_FUNCS = {
     POST_BREACH_COMMUNICATE_AS_NEW_USER: process_communicate_as_new_user_telemetry,
-    # `lambda *args, **kwargs: None` is a no-op.
-    POST_BREACH_BACKDOOR_USER: lambda *args, **kwargs: None,
-    POST_BREACH_FILE_EXECUTION: lambda *args, **kwargs: None,
 }