{ "command_servers": [ "41.50.73.31:5000" ], "internet_services": [ "monkey.guardicore.com", "www.google.com" ], "range_class": "RelativeRange", "range_fixed": [ "" ], "blocked_ips": [""], "current_server": "41.50.73.31:5000", "psexec_passwords": [ "Password1!", "1234", "password", "12345678" ], "ssh_passwords": [ "Password1!", "Password", "1234", "12345", "123", "password", "12345678" ], "alive": true, "collect_system_info": true, "depth": 2, "dropper_date_reference_path": "/bin/sh", "dropper_log_path_windows": "%temp%\\~df1562.tmp", "dropper_log_path_linux": "/tmp/user-1562", "dropper_set_date": true, "dropper_target_path": "C:\\Windows\\monkey.exe", "dropper_target_path_linux": "/tmp/monkey", "kill_file_path_linux": "/var/run/monkey.not", "kill_file_path_windows": "%windir%\\monkey.not", "dropper_try_move_first": false, "exploiter_classes": [ "SSHExploiter", "SmbExploiter", "WmiExploiter", "RdpExploiter", "Ms08_067_Exploiter", "ShellShockExploiter" ], "finger_classes": [ "SSHFinger", "PingScanner", "HTTPFinger", "SMBFinger" ], "max_iterations": 3, "monkey_log_path_windows": "%temp%\\~df1563.tmp", "monkey_log_path_linux": "/tmp/user-1563", "ms08_067_exploit_attempts": 5, "ms08_067_remote_user_add": "Monkey_IUSER_SUPPORT", "ms08_067_remote_user_pass": "Password1!", "ping_scan_timeout": 10000, "psexec_user": "Administrator", "range_size": 30, "rdp_use_vbs_download": true, "smb_download_timeout": 300, "smb_service_name": "InfectionMonkey", "retry_failed_explotation": true, "scanner_class": "TcpScanner", "self_delete_in_cleanup": true, "serialize_config": false, "singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}", "skip_exploit_if_file_exist": true, "ssh_users": [ "root", "user" ], "local_network_scan": true, "tcp_scan_get_banner": true, "tcp_scan_interval": 200, "tcp_scan_timeout": 10000, "tcp_target_ports": [ 22, 445, 135, 3389, 80, 8080, 443, 8008 ], "timeout_between_iterations": 10, "use_file_logging": true, "victims_max_exploit": 7, "victims_max_find": 14 }