forked from p15670423/monkey
commit
89b9e3cc2b
|
@ -64,7 +64,7 @@ DEPTH_3_A = {
|
|||
}
|
||||
|
||||
DEPTH_4_A = {
|
||||
"europe-west1-b": [
|
||||
"europe-west3-a": [
|
||||
"tunneling-9",
|
||||
"tunneling-10",
|
||||
"tunneling-12",
|
||||
|
|
|
@ -13,12 +13,12 @@ from envs.monkey_zoo.blackbox.test_configurations import (
|
|||
depth_1_a_test_configuration,
|
||||
depth_2_a_test_configuration,
|
||||
depth_3_a_test_configuration,
|
||||
depth_4_a_test_configuration,
|
||||
powershell_credentials_reuse_test_configuration,
|
||||
smb_pth_test_configuration,
|
||||
wmi_mimikatz_test_configuration,
|
||||
zerologon_test_configuration,
|
||||
)
|
||||
from envs.monkey_zoo.blackbox.test_configurations.depth_4_a import depth_4_a_test_configuration
|
||||
from envs.monkey_zoo.blackbox.test_configurations.test_configuration import TestConfiguration
|
||||
from envs.monkey_zoo.blackbox.tests.exploitation import ExploitationTest
|
||||
from envs.monkey_zoo.blackbox.utils.gcp_machine_handlers import (
|
||||
|
|
|
@ -2,6 +2,7 @@ from .test_configuration import TestConfiguration
|
|||
from .depth_1_a import depth_1_a_test_configuration
|
||||
from .depth_2_a import depth_2_a_test_configuration
|
||||
from .depth_3_a import depth_3_a_test_configuration
|
||||
from .depth_4_a import depth_4_a_test_configuration
|
||||
from .powershell_credentials_reuse import powershell_credentials_reuse_test_configuration
|
||||
from .smb_pth import smb_pth_test_configuration
|
||||
from .wmi_mimikatz import wmi_mimikatz_test_configuration
|
||||
|
|
|
@ -32,7 +32,7 @@ def _add_subnets(agent_configuration: AgentConfiguration) -> AgentConfiguration:
|
|||
"10.2.2.9",
|
||||
"10.2.1.10",
|
||||
"10.2.0.12",
|
||||
"10.2.2.13",
|
||||
"10.2.0.13",
|
||||
]
|
||||
return add_subnets(agent_configuration, subnets)
|
||||
|
||||
|
|
|
@ -11,6 +11,9 @@ This document describes Infection Monkey’s test network, how to deploy and use
|
|||
[Nr. 3 Hadoop](#_Toc526517183)<br>
|
||||
[Nr. 9 Tunneling M1](#_Toc536021462)<br>
|
||||
[Nr. 10 Tunneling M2](#_Toc536021463)<br>
|
||||
[Nr. 11 Tunneling M1](#_Toc536021464)<br>
|
||||
[Nr. 12 Tunneling M2](#_Toc536021465)<br>
|
||||
[Nr. 13 Tunneling M2](#_Toc536021466)<br>
|
||||
[Nr. 11 SSH key steal](#_Toc526517190)<br>
|
||||
[Nr. 12 SSH key steal](#_Toc526517191)<br>
|
||||
[Nr. 13 RDP grinder](#_Toc526517192)<br>
|
||||
|
@ -319,7 +322,7 @@ Update all requirements using deployment script:<br>
|
|||
<table>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>11</strong> Tunneling M3</p>
|
||||
<th><p><span id="_Toc536021464" class="anchor"></span>Nr. <strong>11</strong> Tunneling M3</p>
|
||||
<p>(10.2.0.11)</p></th>
|
||||
<th>(Exploitable)</th>
|
||||
</tr>
|
||||
|
@ -358,7 +361,7 @@ This prevents ssh exploitation, but allows tunneling.</td>
|
|||
<table>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>12</strong> Tunneling M4</p>
|
||||
<th><p><span id="_Toc536021465" class="anchor"></span>Nr. <strong>12</strong> Tunneling M4</p>
|
||||
<p>(10.2.0.12)</p></th>
|
||||
<th>(Exploitable)</th>
|
||||
</tr>
|
||||
|
@ -390,7 +393,7 @@ This prevents ssh exploitation, but allows tunneling.</td>
|
|||
<table>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th><p><span id="_Toc536021463" class="anchor"></span>Nr. <strong>13</strong> Tunneling M5</p>
|
||||
<th><p><span id="_Toc536021466" class="anchor"></span>Nr. <strong>13</strong> Tunneling M5</p>
|
||||
<p>(10.2.0.13)</p></th>
|
||||
<th>(Exploitable)</th>
|
||||
</tr>
|
||||
|
|
Loading…
Reference in New Issue