Common: Remove old sub-configurations using marshmallow

This commit is contained in:
Shreya Malviya 2022-08-29 17:21:34 +05:30
parent 1311fd5d27
commit f2c9952685
1 changed files with 0 additions and 163 deletions

View File

@ -1,4 +1,3 @@
from dataclasses import dataclass
from typing import Dict, Tuple from typing import Dict, Tuple
from pydantic import PositiveFloat, PositiveInt, conint, validator from pydantic import PositiveFloat, PositiveInt, conint, validator
@ -13,29 +12,6 @@ from .validators import (
) )
@dataclass(frozen=True)
class CustomPBAConfiguration:
"""
A configuration for custom post-breach actions
Attributes:
:param linux_command: Command to run on Linux victim machines. If a file is uploaded,
use this field to change its permissions, execute it, and/or delete it
Example: `chmod +x file.sh; ./file.sh; rm file.sh`
:param linux_filename: Name of the file to upload on Linux victim machines
:param windows_command: Command to run on Windows victim machines. If a file is uploaded,
use this field to change its permissions, execute it, and/or delete
it
Example: `file.bat & del file.bat`
:param windows_filename: Name of the file to upload on Windows victim machines
"""
linux_command: str
linux_filename: str
windows_command: str
windows_filename: str
class Pydantic___CustomPBAConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___CustomPBAConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for custom post-breach actions A configuration for custom post-breach actions
@ -68,33 +44,6 @@ class Pydantic___CustomPBAConfiguration(MutableInfectionMonkeyBaseModel):
return filename return filename
@dataclass(frozen=True)
class PluginConfiguration:
"""
A configuration for plugins
Attributes:
:param name: Name of the plugin
Example: "ransomware"
:param options: Any other information/configuration fields relevant to the plugin
Example: {
"encryption": {
"enabled": True,
"directories": {
"linux_target_dir": "~/this_dir",
"windows_target_dir": "C:\that_dir"
},
},
"other_behaviors": {
"readme": True
},
}
"""
name: str
options: Dict
class Pydantic___PluginConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___PluginConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for plugins A configuration for plugins
@ -121,28 +70,6 @@ class Pydantic___PluginConfiguration(MutableInfectionMonkeyBaseModel):
options: Dict options: Dict
@dataclass(frozen=True)
class ScanTargetConfiguration:
"""
Configuration of network targets to scan and exploit
Attributes:
:param blocked_ips: IP's that won't be scanned
Example: ("1.1.1.1", "2.2.2.2")
:param inaccessible_subnets: Subnet ranges that shouldn't be accessible for the agent
Example: ("1.1.1.1", "2.2.2.2/24", "myserver")
:param local_network_scan: Whether or not the agent should scan the local network
:param subnets: Subnet ranges to scan
Example: ("192.168.1.1-192.168.2.255", "3.3.3.3", "2.2.2.2/24",
"myHostname")
"""
blocked_ips: Tuple[str, ...]
inaccessible_subnets: Tuple[str, ...]
local_network_scan: bool
subnets: Tuple[str, ...]
class Pydantic___ScanTargetConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___ScanTargetConfiguration(MutableInfectionMonkeyBaseModel):
""" """
Configuration of network targets to scan and exploit Configuration of network targets to scan and exploit
@ -179,18 +106,6 @@ class Pydantic___ScanTargetConfiguration(MutableInfectionMonkeyBaseModel):
return subnet_range return subnet_range
@dataclass(frozen=True)
class ICMPScanConfiguration:
"""
A configuration for ICMP scanning
Attributes:
:param timeout: Maximum time in seconds to wait for a response from the target
"""
timeout: float
class Pydantic___ICMPScanConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___ICMPScanConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for ICMP scanning A configuration for ICMP scanning
@ -202,20 +117,6 @@ class Pydantic___ICMPScanConfiguration(MutableInfectionMonkeyBaseModel):
timeout: PositiveFloat timeout: PositiveFloat
@dataclass(frozen=True)
class TCPScanConfiguration:
"""
A configuration for TCP scanning
Attributes:
:param timeout: Maximum time in seconds to wait for a response from the target
:param ports: Ports to scan
"""
timeout: float
ports: Tuple[int, ...]
class Pydantic___TCPScanConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___TCPScanConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for TCP scanning A configuration for TCP scanning
@ -229,24 +130,6 @@ class Pydantic___TCPScanConfiguration(MutableInfectionMonkeyBaseModel):
ports: Tuple[conint(ge=0, le=65535), ...] ports: Tuple[conint(ge=0, le=65535), ...]
@dataclass(frozen=True)
class NetworkScanConfiguration:
"""
A configuration for network scanning
Attributes:
:param tcp: Configuration for TCP scanning
:param icmp: Configuration for ICMP scanning
:param fingerprinters: Configuration for fingerprinters to run
:param targets: Configuration for targets to scan
"""
tcp: TCPScanConfiguration
icmp: ICMPScanConfiguration
fingerprinters: Tuple[PluginConfiguration, ...]
targets: ScanTargetConfiguration
class Pydantic___NetworkScanConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___NetworkScanConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for network scanning A configuration for network scanning
@ -264,18 +147,6 @@ class Pydantic___NetworkScanConfiguration(MutableInfectionMonkeyBaseModel):
targets: Pydantic___ScanTargetConfiguration targets: Pydantic___ScanTargetConfiguration
@dataclass(frozen=True)
class ExploitationOptionsConfiguration:
"""
A configuration for exploitation options
Attributes:
:param http_ports: HTTP ports to exploit
"""
http_ports: Tuple[int, ...]
class Pydantic___ExploitationOptionsConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___ExploitationOptionsConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for exploitation options A configuration for exploitation options
@ -287,22 +158,6 @@ class Pydantic___ExploitationOptionsConfiguration(MutableInfectionMonkeyBaseMode
http_ports: Tuple[conint(ge=0, le=65535), ...] http_ports: Tuple[conint(ge=0, le=65535), ...]
@dataclass(frozen=True)
class ExploitationConfiguration:
"""
A configuration for exploitation
Attributes:
:param options: Exploitation options shared by all exploiters
:param brute_force: Configuration for brute force exploiters
:param vulnerability: Configuration for vulnerability exploiters
"""
options: ExploitationOptionsConfiguration
brute_force: Tuple[PluginConfiguration, ...]
vulnerability: Tuple[PluginConfiguration, ...]
class Pydantic___ExploitationConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___ExploitationConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for exploitation A configuration for exploitation
@ -318,24 +173,6 @@ class Pydantic___ExploitationConfiguration(MutableInfectionMonkeyBaseModel):
vulnerability: Tuple[Pydantic___PluginConfiguration, ...] vulnerability: Tuple[Pydantic___PluginConfiguration, ...]
@dataclass(frozen=True)
class PropagationConfiguration:
"""
A configuration for propagation
Attributes:
:param maximum_depth: Maximum number of hops allowed to spread from the machine where
the attack started i.e. how far to propagate in the network from the
first machine
:param network_scan: Configuration for network scanning
:param exploitation: Configuration for exploitation
"""
maximum_depth: int
network_scan: NetworkScanConfiguration
exploitation: ExploitationConfiguration
class Pydantic___PropagationConfiguration(MutableInfectionMonkeyBaseModel): class Pydantic___PropagationConfiguration(MutableInfectionMonkeyBaseModel):
""" """
A configuration for propagation A configuration for propagation