forked from p15670423/monkey
Reverted bug in config, added 'user' to default bruteforce.
This commit is contained in:
parent
6a51e926f8
commit
12ff0c5677
|
@ -44,7 +44,6 @@ def _cast_by_example(value, example):
|
||||||
|
|
||||||
|
|
||||||
class Configuration(object):
|
class Configuration(object):
|
||||||
|
|
||||||
def from_dict(self, data):
|
def from_dict(self, data):
|
||||||
for key, value in data.items():
|
for key, value in data.items():
|
||||||
if key.startswith('_'):
|
if key.startswith('_'):
|
||||||
|
@ -134,9 +133,9 @@ class Configuration(object):
|
||||||
|
|
||||||
scanner_class = TcpScanner
|
scanner_class = TcpScanner
|
||||||
finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger]
|
finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger]
|
||||||
exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits
|
exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits
|
||||||
SSHExploiter, ShellShockExploiter # Linux
|
SSHExploiter, ShellShockExploiter # Linux
|
||||||
]
|
]
|
||||||
|
|
||||||
# how many victims to look for in a single scan iteration
|
# how many victims to look for in a single scan iteration
|
||||||
victims_max_find = 14
|
victims_max_find = 14
|
||||||
|
@ -167,11 +166,11 @@ class Configuration(object):
|
||||||
###########################
|
###########################
|
||||||
|
|
||||||
# Auto detect and scan local subnets
|
# Auto detect and scan local subnets
|
||||||
local_network_scan = False
|
local_network_scan = True
|
||||||
|
|
||||||
range_class = FixedRange
|
range_class = FixedRange
|
||||||
range_size = 1
|
range_size = 1
|
||||||
range_fixed = ['']
|
range_fixed = ['',]
|
||||||
|
|
||||||
# TCP Scanner
|
# TCP Scanner
|
||||||
HTTP_PORTS = [80, 8080, 443,
|
HTTP_PORTS = [80, 8080, 443,
|
||||||
|
@ -201,7 +200,7 @@ class Configuration(object):
|
||||||
psexec_passwords = ["Password1!", "1234", "password", "12345678"]
|
psexec_passwords = ["Password1!", "1234", "password", "12345678"]
|
||||||
|
|
||||||
# ssh exploiter
|
# ssh exploiter
|
||||||
ssh_users = ["root",'user']
|
ssh_users = ["root", 'user']
|
||||||
ssh_passwords = ["Password1!", "1234", "password", "12345678"]
|
ssh_passwords = ["Password1!", "1234", "password", "12345678"]
|
||||||
|
|
||||||
# rdp exploiter
|
# rdp exploiter
|
||||||
|
@ -210,4 +209,5 @@ class Configuration(object):
|
||||||
# system info collection
|
# system info collection
|
||||||
collect_system_info = True
|
collect_system_info = True
|
||||||
|
|
||||||
|
|
||||||
WormConfiguration = Configuration()
|
WormConfiguration = Configuration()
|
||||||
|
|
|
@ -72,7 +72,8 @@
|
||||||
"singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}",
|
"singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}",
|
||||||
"skip_exploit_if_file_exist": true,
|
"skip_exploit_if_file_exist": true,
|
||||||
"ssh_users": [
|
"ssh_users": [
|
||||||
"root"
|
"root",
|
||||||
|
"user"
|
||||||
],
|
],
|
||||||
"local_network_scan": true,
|
"local_network_scan": true,
|
||||||
"tcp_scan_get_banner": true,
|
"tcp_scan_get_banner": true,
|
||||||
|
|
Loading…
Reference in New Issue