2019-01-22 23:32:42 +08:00
|
|
|
{
|
|
|
|
"basic": {
|
|
|
|
"credentials": {
|
|
|
|
"exploit_password_list": [
|
|
|
|
"`))jU7L(w}",
|
|
|
|
"3Q=(Ge(+&w]*",
|
|
|
|
"^NgDvY59~8",
|
|
|
|
"Ivrrw5zEzs",
|
|
|
|
"YbS,<tpS.2av"
|
|
|
|
],
|
|
|
|
"exploit_user_list": [
|
|
|
|
"m0nk3y"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"basic_network": {
|
|
|
|
"general": {
|
|
|
|
"blocked_ips": [],
|
|
|
|
"depth": 2,
|
|
|
|
"local_network_scan": false,
|
|
|
|
"subnet_scan_list": [
|
|
|
|
"10.2.2.2",
|
|
|
|
"10.2.2.3",
|
|
|
|
"10.2.2.4",
|
|
|
|
"10.2.2.5",
|
|
|
|
"10.2.2.8",
|
|
|
|
"10.2.2.9",
|
|
|
|
"10.2.1.9",
|
|
|
|
"10.2.1.10",
|
|
|
|
"10.2.2.11",
|
|
|
|
"10.2.2.12",
|
|
|
|
"10.2.2.14",
|
|
|
|
"10.2.2.15",
|
|
|
|
"10.2.2.16",
|
|
|
|
"10.2.2.18",
|
|
|
|
"10.2.2.19",
|
|
|
|
"10.2.2.20",
|
|
|
|
"10.2.2.21",
|
|
|
|
"10.2.2.23",
|
|
|
|
"10.2.2.24"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"network_analysis": {
|
|
|
|
"inaccessible_subnets": []
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"cnc": {
|
|
|
|
"servers": {
|
|
|
|
"command_servers": [
|
|
|
|
"192.168.56.1:5000",
|
|
|
|
"158.129.18.132:5000"
|
|
|
|
],
|
|
|
|
"current_server": "192.168.56.1:5000",
|
|
|
|
"internet_services": [
|
|
|
|
"monkey.guardicore.com",
|
|
|
|
"www.google.com"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"exploits": {
|
|
|
|
"general": {
|
|
|
|
"exploiter_classes": [
|
|
|
|
"SmbExploiter",
|
|
|
|
"WmiExploiter",
|
2019-01-24 18:16:31 +08:00
|
|
|
"RdpExploiter",
|
2019-01-22 23:32:42 +08:00
|
|
|
"ShellShockExploiter",
|
|
|
|
"SambaCryExploiter",
|
|
|
|
"ElasticGroovyExploiter",
|
|
|
|
"Struts2Exploiter",
|
|
|
|
"WebLogicExploiter",
|
|
|
|
"HadoopExploiter"
|
|
|
|
],
|
|
|
|
"skip_exploit_if_file_exist": false
|
|
|
|
},
|
|
|
|
"ms08_067": {
|
|
|
|
"ms08_067_exploit_attempts": 5,
|
|
|
|
"ms08_067_remote_user_add": "Monkey_IUSER_SUPPORT",
|
2019-01-24 18:16:31 +08:00
|
|
|
"ms08_067_remote_user_pass": "Password1!",
|
|
|
|
"remote_user_pass": "Password1!",
|
|
|
|
"user_to_add": "Monkey_IUSER_SUPPORT"
|
2019-01-22 23:32:42 +08:00
|
|
|
},
|
|
|
|
"rdp_grinder": {
|
|
|
|
"rdp_use_vbs_download": true
|
|
|
|
},
|
|
|
|
"sambacry": {
|
|
|
|
"sambacry_folder_paths_to_guess": [
|
|
|
|
"/",
|
|
|
|
"/mnt",
|
|
|
|
"/tmp",
|
|
|
|
"/storage",
|
|
|
|
"/export",
|
|
|
|
"/share",
|
|
|
|
"/shares",
|
|
|
|
"/home"
|
|
|
|
],
|
|
|
|
"sambacry_shares_not_to_check": [
|
|
|
|
"IPC$",
|
|
|
|
"print$"
|
|
|
|
],
|
|
|
|
"sambacry_trigger_timeout": 5
|
|
|
|
},
|
|
|
|
"smb_service": {
|
|
|
|
"smb_download_timeout": 300,
|
|
|
|
"smb_service_name": "InfectionMonkey"
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"internal": {
|
|
|
|
"classes": {
|
|
|
|
"finger_classes": [
|
|
|
|
"SMBFinger",
|
|
|
|
"SSHFinger",
|
|
|
|
"PingScanner",
|
|
|
|
"HTTPFinger",
|
|
|
|
"MySQLFinger",
|
|
|
|
"MSSQLFinger",
|
|
|
|
"ElasticFinger"
|
|
|
|
],
|
|
|
|
"scanner_class": "TcpScanner"
|
|
|
|
},
|
|
|
|
"dropper": {
|
|
|
|
"dropper_date_reference_path_linux": "/bin/sh",
|
|
|
|
"dropper_date_reference_path_windows": "%windir%\\system32\\kernel32.dll",
|
|
|
|
"dropper_set_date": true,
|
|
|
|
"dropper_target_path_linux": "/tmp/monkey",
|
|
|
|
"dropper_target_path_win_32": "C:\\Windows\\monkey32.exe",
|
|
|
|
"dropper_target_path_win_64": "C:\\Windows\\monkey64.exe",
|
|
|
|
"dropper_try_move_first": true
|
|
|
|
},
|
|
|
|
"exploits": {
|
|
|
|
"exploit_lm_hash_list": [],
|
|
|
|
"exploit_ntlm_hash_list": [],
|
|
|
|
"exploit_ssh_keys": []
|
|
|
|
},
|
|
|
|
"general": {
|
|
|
|
"keep_tunnel_open_time": 60,
|
|
|
|
"singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}"
|
|
|
|
},
|
|
|
|
"kill_file": {
|
|
|
|
"kill_file_path_linux": "/var/run/monkey.not",
|
|
|
|
"kill_file_path_windows": "%windir%\\monkey.not"
|
|
|
|
},
|
|
|
|
"logging": {
|
|
|
|
"dropper_log_path_linux": "/tmp/user-1562",
|
|
|
|
"dropper_log_path_windows": "%temp%\\~df1562.tmp",
|
|
|
|
"monkey_log_path_linux": "/tmp/user-1563",
|
|
|
|
"monkey_log_path_windows": "%temp%\\~df1563.tmp",
|
|
|
|
"send_log_to_server": true
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"monkey": {
|
|
|
|
"behaviour": {
|
|
|
|
"self_delete_in_cleanup": false,
|
|
|
|
"serialize_config": false,
|
|
|
|
"use_file_logging": true
|
|
|
|
},
|
|
|
|
"general": {
|
2019-01-24 18:16:31 +08:00
|
|
|
"alive": true,
|
|
|
|
"post_breach_actions": [
|
|
|
|
"BackdoorUser"
|
|
|
|
]
|
2019-01-22 23:32:42 +08:00
|
|
|
},
|
|
|
|
"life_cycle": {
|
|
|
|
"max_iterations": 1,
|
|
|
|
"retry_failed_explotation": true,
|
|
|
|
"timeout_between_iterations": 100,
|
2019-01-24 18:16:31 +08:00
|
|
|
"victims_max_exploit": 30,
|
2019-01-22 23:32:42 +08:00
|
|
|
"victims_max_find": 30
|
|
|
|
},
|
|
|
|
"system_info": {
|
|
|
|
"collect_system_info": true,
|
|
|
|
"extract_azure_creds": true,
|
|
|
|
"should_use_mimikatz": true
|
|
|
|
}
|
|
|
|
},
|
|
|
|
"network": {
|
|
|
|
"ping_scanner": {
|
|
|
|
"ping_scan_timeout": 1000
|
|
|
|
},
|
|
|
|
"tcp_scanner": {
|
|
|
|
"HTTP_PORTS": [
|
|
|
|
80,
|
|
|
|
8080,
|
|
|
|
443,
|
|
|
|
8008,
|
|
|
|
7001
|
|
|
|
],
|
|
|
|
"tcp_scan_get_banner": true,
|
|
|
|
"tcp_scan_interval": 200,
|
|
|
|
"tcp_scan_timeout": 3000,
|
|
|
|
"tcp_target_ports": [
|
|
|
|
22,
|
|
|
|
2222,
|
|
|
|
445,
|
|
|
|
135,
|
|
|
|
3389,
|
|
|
|
80,
|
|
|
|
8080,
|
|
|
|
443,
|
|
|
|
8008,
|
|
|
|
3306,
|
|
|
|
9200,
|
|
|
|
7001
|
|
|
|
]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|