Agent: Remove disused methods and attributes from WormConfiguration
This commit is contained in:
parent
32491d5998
commit
4a10882bcc
|
@ -1,9 +1,7 @@
|
||||||
import hashlib
|
|
||||||
import os
|
import os
|
||||||
import sys
|
import sys
|
||||||
import uuid
|
import uuid
|
||||||
from abc import ABCMeta
|
from abc import ABCMeta
|
||||||
from itertools import product
|
|
||||||
|
|
||||||
GUID = str(uuid.getnode())
|
GUID = str(uuid.getnode())
|
||||||
|
|
||||||
|
@ -74,8 +72,6 @@ class Configuration(object):
|
||||||
dropper_set_date = True
|
dropper_set_date = True
|
||||||
dropper_date_reference_path_windows = r"%windir%\system32\kernel32.dll"
|
dropper_date_reference_path_windows = r"%windir%\system32\kernel32.dll"
|
||||||
dropper_date_reference_path_linux = "/bin/sh"
|
dropper_date_reference_path_linux = "/bin/sh"
|
||||||
dropper_target_path_win_64 = r"C:\Windows\temp\monkey64.exe"
|
|
||||||
dropper_target_path_linux = "/tmp/monkey"
|
|
||||||
|
|
||||||
###########################
|
###########################
|
||||||
# monkey config
|
# monkey config
|
||||||
|
@ -93,34 +89,6 @@ class Configuration(object):
|
||||||
|
|
||||||
keep_tunnel_open_time = 60
|
keep_tunnel_open_time = 60
|
||||||
|
|
||||||
def get_exploit_user_password_pairs(self):
|
|
||||||
"""
|
|
||||||
Returns all combinations of the configurations users and passwords
|
|
||||||
:return:
|
|
||||||
"""
|
|
||||||
return product(self.exploit_user_list, self.exploit_password_list)
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def hash_sensitive_data(sensitive_data):
|
|
||||||
"""
|
|
||||||
Hash sensitive data (e.g. passwords). Used so the log won't contain sensitive data
|
|
||||||
plain-text, as the log is
|
|
||||||
saved on client machines plain-text.
|
|
||||||
|
|
||||||
:param sensitive_data: the data to hash.
|
|
||||||
:return: the hashed data.
|
|
||||||
"""
|
|
||||||
password_hashed = hashlib.sha512(sensitive_data.encode()).hexdigest()
|
|
||||||
return password_hashed
|
|
||||||
|
|
||||||
exploit_user_list = ["Administrator", "root", "user"]
|
|
||||||
exploit_password_list = ["Password1!", "1234", "password", "12345678"]
|
|
||||||
exploit_lm_hash_list = []
|
|
||||||
exploit_ntlm_hash_list = []
|
|
||||||
|
|
||||||
# smb/wmi exploiter
|
|
||||||
smb_download_timeout = 30 # timeout in seconds
|
|
||||||
|
|
||||||
###########################
|
###########################
|
||||||
# post breach actions
|
# post breach actions
|
||||||
###########################
|
###########################
|
||||||
|
|
Loading…
Reference in New Issue