forked from p15670423/monkey
commit
89b9e3cc2b
|
@ -64,7 +64,7 @@ DEPTH_3_A = {
|
||||||
}
|
}
|
||||||
|
|
||||||
DEPTH_4_A = {
|
DEPTH_4_A = {
|
||||||
"europe-west1-b": [
|
"europe-west3-a": [
|
||||||
"tunneling-9",
|
"tunneling-9",
|
||||||
"tunneling-10",
|
"tunneling-10",
|
||||||
"tunneling-12",
|
"tunneling-12",
|
||||||
|
|
|
@ -13,12 +13,12 @@ from envs.monkey_zoo.blackbox.test_configurations import (
|
||||||
depth_1_a_test_configuration,
|
depth_1_a_test_configuration,
|
||||||
depth_2_a_test_configuration,
|
depth_2_a_test_configuration,
|
||||||
depth_3_a_test_configuration,
|
depth_3_a_test_configuration,
|
||||||
|
depth_4_a_test_configuration,
|
||||||
powershell_credentials_reuse_test_configuration,
|
powershell_credentials_reuse_test_configuration,
|
||||||
smb_pth_test_configuration,
|
smb_pth_test_configuration,
|
||||||
wmi_mimikatz_test_configuration,
|
wmi_mimikatz_test_configuration,
|
||||||
zerologon_test_configuration,
|
zerologon_test_configuration,
|
||||||
)
|
)
|
||||||
from envs.monkey_zoo.blackbox.test_configurations.depth_4_a import depth_4_a_test_configuration
|
|
||||||
from envs.monkey_zoo.blackbox.test_configurations.test_configuration import TestConfiguration
|
from envs.monkey_zoo.blackbox.test_configurations.test_configuration import TestConfiguration
|
||||||
from envs.monkey_zoo.blackbox.tests.exploitation import ExploitationTest
|
from envs.monkey_zoo.blackbox.tests.exploitation import ExploitationTest
|
||||||
from envs.monkey_zoo.blackbox.utils.gcp_machine_handlers import (
|
from envs.monkey_zoo.blackbox.utils.gcp_machine_handlers import (
|
||||||
|
|
|
@ -2,6 +2,7 @@ from .test_configuration import TestConfiguration
|
||||||
from .depth_1_a import depth_1_a_test_configuration
|
from .depth_1_a import depth_1_a_test_configuration
|
||||||
from .depth_2_a import depth_2_a_test_configuration
|
from .depth_2_a import depth_2_a_test_configuration
|
||||||
from .depth_3_a import depth_3_a_test_configuration
|
from .depth_3_a import depth_3_a_test_configuration
|
||||||
|
from .depth_4_a import depth_4_a_test_configuration
|
||||||
from .powershell_credentials_reuse import powershell_credentials_reuse_test_configuration
|
from .powershell_credentials_reuse import powershell_credentials_reuse_test_configuration
|
||||||
from .smb_pth import smb_pth_test_configuration
|
from .smb_pth import smb_pth_test_configuration
|
||||||
from .wmi_mimikatz import wmi_mimikatz_test_configuration
|
from .wmi_mimikatz import wmi_mimikatz_test_configuration
|
||||||
|
|
|
@ -32,7 +32,7 @@ def _add_subnets(agent_configuration: AgentConfiguration) -> AgentConfiguration:
|
||||||
"10.2.2.9",
|
"10.2.2.9",
|
||||||
"10.2.1.10",
|
"10.2.1.10",
|
||||||
"10.2.0.12",
|
"10.2.0.12",
|
||||||
"10.2.2.13",
|
"10.2.0.13",
|
||||||
]
|
]
|
||||||
return add_subnets(agent_configuration, subnets)
|
return add_subnets(agent_configuration, subnets)
|
||||||
|
|
||||||
|
|
|
@ -11,6 +11,9 @@ This document describes Infection Monkey’s test network, how to deploy and use
|
||||||
[Nr. 3 Hadoop](#_Toc526517183)<br>
|
[Nr. 3 Hadoop](#_Toc526517183)<br>
|
||||||
[Nr. 9 Tunneling M1](#_Toc536021462)<br>
|
[Nr. 9 Tunneling M1](#_Toc536021462)<br>
|
||||||
[Nr. 10 Tunneling M2](#_Toc536021463)<br>
|
[Nr. 10 Tunneling M2](#_Toc536021463)<br>
|
||||||
|
[Nr. 11 Tunneling M1](#_Toc536021464)<br>
|
||||||
|
[Nr. 12 Tunneling M2](#_Toc536021465)<br>
|
||||||
|
[Nr. 13 Tunneling M2](#_Toc536021466)<br>
|
||||||
[Nr. 11 SSH key steal](#_Toc526517190)<br>
|
[Nr. 11 SSH key steal](#_Toc526517190)<br>
|
||||||
[Nr. 12 SSH key steal](#_Toc526517191)<br>
|
[Nr. 12 SSH key steal](#_Toc526517191)<br>
|
||||||
[Nr. 13 RDP grinder](#_Toc526517192)<br>
|
[Nr. 13 RDP grinder](#_Toc526517192)<br>
|
||||||
|
@ -319,7 +322,7 @@ Update all requirements using deployment script:<br>
|
||||||
<table>
|
<table>
|
||||||
<thead>
|
<thead>
|
||||||
<tr class="header">
|
<tr class="header">
|
||||||
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>11</strong> Tunneling M3</p>
|
<th><p><span id="_Toc536021464" class="anchor"></span>Nr. <strong>11</strong> Tunneling M3</p>
|
||||||
<p>(10.2.0.11)</p></th>
|
<p>(10.2.0.11)</p></th>
|
||||||
<th>(Exploitable)</th>
|
<th>(Exploitable)</th>
|
||||||
</tr>
|
</tr>
|
||||||
|
@ -358,7 +361,7 @@ This prevents ssh exploitation, but allows tunneling.</td>
|
||||||
<table>
|
<table>
|
||||||
<thead>
|
<thead>
|
||||||
<tr class="header">
|
<tr class="header">
|
||||||
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>12</strong> Tunneling M4</p>
|
<th><p><span id="_Toc536021465" class="anchor"></span>Nr. <strong>12</strong> Tunneling M4</p>
|
||||||
<p>(10.2.0.12)</p></th>
|
<p>(10.2.0.12)</p></th>
|
||||||
<th>(Exploitable)</th>
|
<th>(Exploitable)</th>
|
||||||
</tr>
|
</tr>
|
||||||
|
@ -390,7 +393,7 @@ This prevents ssh exploitation, but allows tunneling.</td>
|
||||||
<table>
|
<table>
|
||||||
<thead>
|
<thead>
|
||||||
<tr class="header">
|
<tr class="header">
|
||||||
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>13</strong> Tunneling M5</p>
|
<th><p><span id="_Toc536021466" class="anchor"></span>Nr. <strong>13</strong> Tunneling M5</p>
|
||||||
<p>(10.2.0.13)</p></th>
|
<p>(10.2.0.13)</p></th>
|
||||||
<th>(Exploitable)</th>
|
<th>(Exploitable)</th>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
Loading…
Reference in New Issue