Commit Graph

5623 Commits

Author SHA1 Message Date
Ilija Lazoroski 81a8ccf673 Island: Return empty post status for island mode 2021-07-13 10:25:48 -04:00
Ilija Lazoroski f9ed53a527 Island: Add UT tests for island mode model 2021-07-13 10:58:04 +02:00
VakarisZ 3bde6f013a Island: Add a couple of island mode resource unit tests 2021-07-12 16:00:23 +03:00
VakarisZ 2778b69dfb Island: Add unit test infrastructure for testing resources 2021-07-12 15:59:36 +03:00
VakarisZ f8b6277a88 Island: Add an endpoint for setting the island's mode. Also, add an enum of all the modes 2021-07-12 13:32:14 +03:00
Mike Salvatore af739b6c99
Merge pull request #1309 from guardicore/1287/ransomware-readme-config-dirs
Ransomware README with configurable directories
2021-07-09 15:47:22 -04:00
Mike Salvatore eb36869e71 Island: Minor wording change to readme_note description 2021-07-09 15:41:31 -04:00
Mike Salvatore a119855d84 Tests: Remove unnecessary option from test_no_readme_if_no_directory 2021-07-09 15:38:53 -04:00
Mike Salvatore d108812e26 Agent: Remove redundant condition from RansomwarePayload.run_payload() 2021-07-09 14:49:00 -04:00
Ilija Lazoroski 824ffc3dfe Merge branch '1287/ransomware-readme-config-dirs' of https://github.com/guardicore/monkey into 1287/ransomware-readme-config-dirs 2021-07-09 14:39:05 +02:00
Ilija Lazoroski 31a33a70cd Island: Add different aproach to check for readme 2021-07-09 14:38:30 +02:00
Ilija Lazoroski 947ecb330c Island: Add different aproach to check for readme 2021-07-09 14:33:43 +02:00
Ilija Lazoroski cd2d08d266 Island: Improve wording on readme.txt note 2021-07-09 13:45:54 +02:00
Ilija Lazoroski 80f98575b2 Merge branch '1287/ransomware-readme-config-dirs' of https://github.com/guardicore/monkey into 1287/ransomware-readme-config-dirs 2021-07-09 12:38:21 +02:00
Ilija Lazoroski 0419e14a7a Island: Add readme note to the bottom of the page 2021-07-09 12:36:44 +02:00
Ilija Lazoroski 8e22d2d1ae Island: Add readme note to the bottom of the page 2021-07-09 12:23:12 +02:00
Ilija Lazoroski 80050b89e6 Island: Add unit test leaving no readme if no target dir 2021-07-09 11:23:22 +02:00
Ilija Lazoroski 69754205d0 Island: Add condition for leaving readme 2021-07-09 11:15:55 +02:00
Ilija Lazoroski 253f2668d0 Island: Add hidden widget to encryption and readme in ransomware 2021-07-08 20:49:55 +02:00
Mike Salvatore fb50ba1e55 Agent: Remove unnecessary `if` from _find_files() 2021-07-08 12:52:05 -04:00
Mike Salvatore bb554d923d Agent: Rename _valid_file_extensions... -> _targeted_file_extensions 2021-07-08 12:52:05 -04:00
Mike Salvatore 24fdb9e299
Merge pull request #1307 from guardicore/ransomware-inject-copy-dependency
Ransomware README improvements
2021-07-08 12:50:32 -04:00
Mike Salvatore 92c5c3b682 Agent: Extract method _copy_file() from _leave_readme()
Reworks the logic in _leave_readme() to reduce indenting and improve
clarity and extracts the logic to copy the file into _copy_readme_file()
2021-07-08 12:04:50 -04:00
Mike Salvatore 7454ee72b2 Agent: Switch copy_file typehint from str to Path 2021-07-08 12:04:12 -04:00
Mike Salvatore 064525e6b9 Agent: Don't try to create README.txt if one already exists 2021-07-08 11:59:50 -04:00
Mike Salvatore f0e9109f64 Agent: Inject copy_file callable into RansomwarePayload
In order to test certain conditions, our options are to either
monkeypatch shutil.copyfile(), or inject a callable into the
RansomwarePayload.  Monkeypatching shutil.copyfile() could lead to
issues down the road. For example, if the implementation of
`_leave_readme()` is changed to no longer use copyfile(), a test that
asserts that copyfile() has not been called will pass, even though a
file may have been copied.
2021-07-08 11:23:15 -04:00
Mike Salvatore e1b08079f1
Merge pull request #1305 from guardicore/ransomware-skip-encryption-test-refactor
Island: Refactor test_encryption_skipped_if_no_directory()
2021-07-08 06:37:49 -04:00
Mike Salvatore ecb20dc99a Island: Refactor test_encryption_skipped_if_no_directory()
The old implementation tightly coupled the test to the specific
implementation of the ransomware payload. Since the ransomware payload
provides insight into its actions in the form of telemetry, it should be
sufficient to test whether or not any telemetries were sent in order to
determine whether or not encryption was skipped. This way, the test can
remain decoupled from the internal workings of the ransomware payload.
2021-07-07 19:14:45 -04:00
Mike Salvatore 0db85ae407
Merge pull request #1300 from guardicore/expand-path-returns-path
Expand path returns path
2021-07-07 19:11:10 -04:00
Mike Salvatore ae7687243f Island: Return Path object from expand_path() 2021-07-07 18:49:50 -04:00
Mike Salvatore 8508a9f98f Island: Remove unnecessary expand_path() call 2021-07-07 08:26:37 -04:00
VakarisZ 9ed2145810
Merge pull request #1303 from guardicore/ransomeware_cwd_encryption_bugfix
Ransomeware bugfix: cwd encryption by default
2021-07-07 14:20:39 +03:00
VakarisZ 726e180797 Add a log message explaining why ransomware target directory is set to none 2021-07-07 13:02:10 +03:00
VakarisZ d33fc26fe3 Add a UT to test if ransomware payload tries to encrypt files if "linux_target_dir" and "windows_target_dir" inputs are empty.
We have empty "linux_target_dir" and "windows_target_dir" by default so it's important that ransomware payload doesn't try to encrypt files by default, without users' knowledge.
2021-07-07 11:45:12 +03:00
VakarisZ d3beebf995 Change ransomware_payload.py to not encrypt files in CWD if no directory was specified 2021-07-07 11:41:42 +03:00
VakarisZ ca1712cdd6 Extract the logic of determining target directory for ransomware payload into a separate method 2021-07-07 11:40:56 +03:00
VakarisZ bd60bef35f Change the expand_path method in file_utils.py to throw an error if an empty file path is provided instead of expanding it to current working directory 2021-07-07 11:23:10 +03:00
VakarisZ 6282cd0de3 Add a UT to test if ransomware payload tries to encrypt files if "linux_target_dir" and "windows_target_dir" inputs are empty.
We have empty "linux_target_dir" and "windows_target_dir" by default so it's important that ransomware payload doesn't try to encrypt files by default, without users' knowledge.
2021-07-07 10:48:35 +03:00
Mike Salvatore 5a77785164 Tests: Remove Path -> str implicit conversion warning 2021-07-06 11:56:25 -04:00
Mike Salvatore a512fd947a Tests: Return Path object from patched_home_env() fixture 2021-07-06 11:31:12 -04:00
Mike Salvatore 5ac574bd17 Tests: Fix failing expand_path() tests 2021-07-06 11:29:42 -04:00
Mike Salvatore 8dd1aa25ac
Merge pull request #1292 from guardicore/ransomware_dir_fix
Ransomware: bugfix for directories
2021-07-06 11:25:13 -04:00
Shreya Malviya 999399ae2d
Merge pull request #1291 from guardicore/ransomware-reporting-tab
Add ransomware report tab
2021-07-06 19:59:07 +05:30
Shreya 53faf5a3db tests: Rename test file to avoid "import name mismatch" error by pytest 2021-07-06 19:58:24 +05:30
Shreya c802914cf6 tests: Update tests according to previous changes with `expand_path()` 2021-07-06 19:46:08 +05:30
Shreya 96c3a2ed12 agent, island: Replace import path for `expand_path()` everywhere 2021-07-06 19:45:08 +05:30
Mike Salvatore 6622fc0ff5 Island: Do not set state from props in RansomwareReport 2021-07-06 10:10:33 -04:00
Shreya d0a94e6223 agent, common, island: Move file util `expand_path` to `common/` 2021-07-06 19:40:10 +05:30
Mike Salvatore b1ab2525fd
Merge pull request #1288 from guardicore/ransomware-target-dir-validators
Validate ransomware target directories
2021-07-06 09:50:47 -04:00
Shreya ded6ce0cd0 agent: Use `expand_path()` instead of `os.path` functions in ransomware payload 2021-07-06 19:18:52 +05:30