Merge pull request #1584 from guardicore/1537-send-log-to-server
1537 send log to server
This commit is contained in:
commit
be68d5b688
|
@ -18,6 +18,7 @@ Changelog](https://keepachangelog.com/en/1.0.0/).
|
||||||
- Sambacry exploiter. #1567
|
- Sambacry exploiter. #1567
|
||||||
- "Kill file" option in the config. #1536
|
- "Kill file" option in the config. #1536
|
||||||
- Netstat collector, because network connection information wasn't used anywhere. #1535
|
- Netstat collector, because network connection information wasn't used anywhere. #1535
|
||||||
|
- Checkbox to disable/enable sending log to server. #1537
|
||||||
|
|
||||||
### Fixed
|
### Fixed
|
||||||
- A bug in network map page that caused delay of telemetry log loading. #1545
|
- A bug in network map page that caused delay of telemetry log loading. #1545
|
||||||
|
|
|
@ -82,7 +82,6 @@ class Configuration(object):
|
||||||
dropper_log_path_linux = "/tmp/user-1562"
|
dropper_log_path_linux = "/tmp/user-1562"
|
||||||
monkey_log_path_windows = "%temp%\\~df1563.tmp"
|
monkey_log_path_windows = "%temp%\\~df1563.tmp"
|
||||||
monkey_log_path_linux = "/tmp/user-1563"
|
monkey_log_path_linux = "/tmp/user-1563"
|
||||||
send_log_to_server = True
|
|
||||||
|
|
||||||
###########################
|
###########################
|
||||||
# dropper config
|
# dropper config
|
||||||
|
|
|
@ -50,7 +50,6 @@
|
||||||
"max_iterations": 3,
|
"max_iterations": 3,
|
||||||
"monkey_log_path_windows": "%temp%\\~df1563.tmp",
|
"monkey_log_path_windows": "%temp%\\~df1563.tmp",
|
||||||
"monkey_log_path_linux": "/tmp/user-1563",
|
"monkey_log_path_linux": "/tmp/user-1563",
|
||||||
"send_log_to_server": true,
|
|
||||||
"ms08_067_exploit_attempts": 5,
|
"ms08_067_exploit_attempts": 5,
|
||||||
"user_to_add": "Monkey_IUSER_SUPPORT",
|
"user_to_add": "Monkey_IUSER_SUPPORT",
|
||||||
"ping_scan_timeout": 10000,
|
"ping_scan_timeout": 10000,
|
||||||
|
|
|
@ -323,8 +323,7 @@ class InfectionMonkey(object):
|
||||||
).send() # Signal the server (before closing the tunnel)
|
).send() # Signal the server (before closing the tunnel)
|
||||||
InfectionMonkey.close_tunnel()
|
InfectionMonkey.close_tunnel()
|
||||||
firewall.close()
|
firewall.close()
|
||||||
if WormConfiguration.send_log_to_server:
|
self.send_log()
|
||||||
self.send_log()
|
|
||||||
self._singleton.unlock()
|
self._singleton.unlock()
|
||||||
|
|
||||||
InfectionMonkey.self_delete()
|
InfectionMonkey.self_delete()
|
||||||
|
|
|
@ -302,13 +302,6 @@ INTERNAL = {
|
||||||
"default": "%temp%\\~df1563.tmp",
|
"default": "%temp%\\~df1563.tmp",
|
||||||
"description": "The fullpath of the monkey log file on Windows",
|
"description": "The fullpath of the monkey log file on Windows",
|
||||||
},
|
},
|
||||||
"send_log_to_server": {
|
|
||||||
"title": "Send log to server",
|
|
||||||
"type": "boolean",
|
|
||||||
"default": True,
|
|
||||||
"description": "Determines whether the monkey sends its log to the Monkey "
|
|
||||||
"Island server",
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"exploits": {
|
"exploits": {
|
||||||
|
|
|
@ -126,8 +126,7 @@
|
||||||
"dropper_log_path_linux": "/tmp/user-1562",
|
"dropper_log_path_linux": "/tmp/user-1562",
|
||||||
"dropper_log_path_windows": "%temp%\\~df1562.tmp",
|
"dropper_log_path_windows": "%temp%\\~df1562.tmp",
|
||||||
"monkey_log_path_linux": "/tmp/user-1563",
|
"monkey_log_path_linux": "/tmp/user-1563",
|
||||||
"monkey_log_path_windows": "%temp%\\~df1563.tmp",
|
"monkey_log_path_windows": "%temp%\\~df1563.tmp"
|
||||||
"send_log_to_server": true
|
|
||||||
},
|
},
|
||||||
"exploits": {
|
"exploits": {
|
||||||
"exploit_lm_hash_list": [],
|
"exploit_lm_hash_list": [],
|
||||||
|
|
Loading…
Reference in New Issue