Merge pull request #2305 from guardicore/fix-bb-tests

Fix bb tests
This commit is contained in:
Mike Salvatore 2022-09-16 10:52:25 -04:00 committed by GitHub
commit 89b9e3cc2b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 10 additions and 6 deletions

View File

@ -64,7 +64,7 @@ DEPTH_3_A = {
} }
DEPTH_4_A = { DEPTH_4_A = {
"europe-west1-b": [ "europe-west3-a": [
"tunneling-9", "tunneling-9",
"tunneling-10", "tunneling-10",
"tunneling-12", "tunneling-12",

View File

@ -13,12 +13,12 @@ from envs.monkey_zoo.blackbox.test_configurations import (
depth_1_a_test_configuration, depth_1_a_test_configuration,
depth_2_a_test_configuration, depth_2_a_test_configuration,
depth_3_a_test_configuration, depth_3_a_test_configuration,
depth_4_a_test_configuration,
powershell_credentials_reuse_test_configuration, powershell_credentials_reuse_test_configuration,
smb_pth_test_configuration, smb_pth_test_configuration,
wmi_mimikatz_test_configuration, wmi_mimikatz_test_configuration,
zerologon_test_configuration, zerologon_test_configuration,
) )
from envs.monkey_zoo.blackbox.test_configurations.depth_4_a import depth_4_a_test_configuration
from envs.monkey_zoo.blackbox.test_configurations.test_configuration import TestConfiguration from envs.monkey_zoo.blackbox.test_configurations.test_configuration import TestConfiguration
from envs.monkey_zoo.blackbox.tests.exploitation import ExploitationTest from envs.monkey_zoo.blackbox.tests.exploitation import ExploitationTest
from envs.monkey_zoo.blackbox.utils.gcp_machine_handlers import ( from envs.monkey_zoo.blackbox.utils.gcp_machine_handlers import (

View File

@ -2,6 +2,7 @@ from .test_configuration import TestConfiguration
from .depth_1_a import depth_1_a_test_configuration from .depth_1_a import depth_1_a_test_configuration
from .depth_2_a import depth_2_a_test_configuration from .depth_2_a import depth_2_a_test_configuration
from .depth_3_a import depth_3_a_test_configuration from .depth_3_a import depth_3_a_test_configuration
from .depth_4_a import depth_4_a_test_configuration
from .powershell_credentials_reuse import powershell_credentials_reuse_test_configuration from .powershell_credentials_reuse import powershell_credentials_reuse_test_configuration
from .smb_pth import smb_pth_test_configuration from .smb_pth import smb_pth_test_configuration
from .wmi_mimikatz import wmi_mimikatz_test_configuration from .wmi_mimikatz import wmi_mimikatz_test_configuration

View File

@ -32,7 +32,7 @@ def _add_subnets(agent_configuration: AgentConfiguration) -> AgentConfiguration:
"10.2.2.9", "10.2.2.9",
"10.2.1.10", "10.2.1.10",
"10.2.0.12", "10.2.0.12",
"10.2.2.13", "10.2.0.13",
] ]
return add_subnets(agent_configuration, subnets) return add_subnets(agent_configuration, subnets)

View File

@ -11,6 +11,9 @@ This document describes Infection Monkeys test network, how to deploy and use
[Nr. 3 Hadoop](#_Toc526517183)<br> [Nr. 3 Hadoop](#_Toc526517183)<br>
[Nr. 9 Tunneling M1](#_Toc536021462)<br> [Nr. 9 Tunneling M1](#_Toc536021462)<br>
[Nr. 10 Tunneling M2](#_Toc536021463)<br> [Nr. 10 Tunneling M2](#_Toc536021463)<br>
[Nr. 11 Tunneling M1](#_Toc536021464)<br>
[Nr. 12 Tunneling M2](#_Toc536021465)<br>
[Nr. 13 Tunneling M2](#_Toc536021466)<br>
[Nr. 11 SSH key steal](#_Toc526517190)<br> [Nr. 11 SSH key steal](#_Toc526517190)<br>
[Nr. 12 SSH key steal](#_Toc526517191)<br> [Nr. 12 SSH key steal](#_Toc526517191)<br>
[Nr. 13 RDP grinder](#_Toc526517192)<br> [Nr. 13 RDP grinder](#_Toc526517192)<br>
@ -319,7 +322,7 @@ Update all requirements using deployment script:<br>
<table> <table>
<thead> <thead>
<tr class="header"> <tr class="header">
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>11</strong> Tunneling M3</p> <th><p><span id="_Toc536021464" class="anchor"></span>Nr. <strong>11</strong> Tunneling M3</p>
<p>(10.2.0.11)</p></th> <p>(10.2.0.11)</p></th>
<th>(Exploitable)</th> <th>(Exploitable)</th>
</tr> </tr>
@ -358,7 +361,7 @@ This prevents ssh exploitation, but allows tunneling.</td>
<table> <table>
<thead> <thead>
<tr class="header"> <tr class="header">
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>12</strong> Tunneling M4</p> <th><p><span id="_Toc536021465" class="anchor"></span>Nr. <strong>12</strong> Tunneling M4</p>
<p>(10.2.0.12)</p></th> <p>(10.2.0.12)</p></th>
<th>(Exploitable)</th> <th>(Exploitable)</th>
</tr> </tr>
@ -390,7 +393,7 @@ This prevents ssh exploitation, but allows tunneling.</td>
<table> <table>
<thead> <thead>
<tr class="header"> <tr class="header">
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>13</strong> Tunneling M5</p> <th><p><span id="_Toc536021466" class="anchor"></span>Nr. <strong>13</strong> Tunneling M5</p>
<p>(10.2.0.13)</p></th> <p>(10.2.0.13)</p></th>
<th>(Exploitable)</th> <th>(Exploitable)</th>
</tr> </tr>