Format code using black

This commit is contained in:
Shreya 2021-02-19 00:07:03 +05:30
parent 15107eeea3
commit 8bd30ceb4c
19 changed files with 116 additions and 103 deletions

View File

@ -5,7 +5,7 @@ from infection_monkey.telemetry.attack.attack_telem import AttackTelem
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
TECHNIQUE = 'T9999' TECHNIQUE = "T9999"
@pytest.fixture @pytest.fixture
@ -15,7 +15,6 @@ def attack_telem_test_instance():
def test_attack_telem_send(attack_telem_test_instance, spy_send_telemetry): def test_attack_telem_send(attack_telem_test_instance, spy_send_telemetry):
attack_telem_test_instance.send() attack_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {"status": STATUS.value, "technique": TECHNIQUE}
'technique': TECHNIQUE}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -4,8 +4,8 @@ from common.utils.attack_utils import ScanStatus
from infection_monkey.telemetry.attack.t1005_telem import T1005Telem from infection_monkey.telemetry.attack.t1005_telem import T1005Telem
GATHERED_DATA_TYPE = '[Type of data collected]' GATHERED_DATA_TYPE = "[Type of data collected]"
INFO = '[Additional info]' INFO = "[Additional info]"
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
@ -16,9 +16,11 @@ def T1005_telem_test_instance():
def test_T1005_send(T1005_telem_test_instance, spy_send_telemetry): def test_T1005_send(T1005_telem_test_instance, spy_send_telemetry):
T1005_telem_test_instance.send() T1005_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {
'technique': 'T1005', "status": STATUS.value,
'gathered_data_type': GATHERED_DATA_TYPE, "technique": "T1005",
'info': INFO} "gathered_data_type": GATHERED_DATA_TYPE,
"info": INFO,
}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -15,8 +15,6 @@ def T1035_telem_test_instance():
def test_T1035_send(T1035_telem_test_instance, spy_send_telemetry): def test_T1035_send(T1035_telem_test_instance, spy_send_telemetry):
T1035_telem_test_instance.send() T1035_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {"status": STATUS.value, "technique": "T1035", "usage": USAGE.name}
'technique': 'T1035',
'usage': USAGE.name}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -5,7 +5,7 @@ from infection_monkey.telemetry.attack.t1064_telem import T1064Telem
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
USAGE_STR = '[Usage info]' USAGE_STR = "[Usage info]"
@pytest.fixture @pytest.fixture
@ -15,8 +15,6 @@ def T1064_telem_test_instance():
def test_T1064_send(T1064_telem_test_instance, spy_send_telemetry): def test_T1064_send(T1064_telem_test_instance, spy_send_telemetry):
T1064_telem_test_instance.send() T1064_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {"status": STATUS.value, "technique": "T1064", "usage": USAGE_STR}
'technique': 'T1064',
'usage': USAGE_STR}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -4,9 +4,9 @@ from common.utils.attack_utils import ScanStatus
from infection_monkey.telemetry.attack.t1105_telem import T1105Telem from infection_monkey.telemetry.attack.t1105_telem import T1105Telem
DST_IP = '0.0.0.1' DST_IP = "0.0.0.1"
FILENAME = 'virus.exe' FILENAME = "virus.exe"
SRC_IP = '0.0.0.0' SRC_IP = "0.0.0.0"
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
@ -17,10 +17,12 @@ def T1105_telem_test_instance():
def test_T1105_send(T1105_telem_test_instance, spy_send_telemetry): def test_T1105_send(T1105_telem_test_instance, spy_send_telemetry):
T1105_telem_test_instance.send() T1105_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {
'technique': 'T1105', "status": STATUS.value,
'filename': FILENAME, "technique": "T1105",
'src': SRC_IP, "filename": FILENAME,
'dst': DST_IP} "src": SRC_IP,
"dst": DST_IP,
}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -15,8 +15,6 @@ def T1106_telem_test_instance():
def test_T1106_send(T1106_telem_test_instance, spy_send_telemetry): def test_T1106_send(T1106_telem_test_instance, spy_send_telemetry):
T1106_telem_test_instance.send() T1106_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {"status": STATUS.value, "technique": "T1106", "usage": USAGE.name}
'technique': 'T1106',
'usage': USAGE.name}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -4,7 +4,7 @@ from common.utils.attack_utils import ScanStatus
from infection_monkey.telemetry.attack.t1107_telem import T1107Telem from infection_monkey.telemetry.attack.t1107_telem import T1107Telem
PATH = 'path/to/file.txt' PATH = "path/to/file.txt"
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
@ -15,8 +15,6 @@ def T1107_telem_test_instance():
def test_T1107_send(T1107_telem_test_instance, spy_send_telemetry): def test_T1107_send(T1107_telem_test_instance, spy_send_telemetry):
T1107_telem_test_instance.send() T1107_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {"status": STATUS.value, "technique": "T1107", "path": PATH}
'technique': 'T1107',
'path': PATH}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -15,8 +15,6 @@ def T1129_telem_test_instance():
def test_T1129_send(T1129_telem_test_instance, spy_send_telemetry): def test_T1129_send(T1129_telem_test_instance, spy_send_telemetry):
T1129_telem_test_instance.send() T1129_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {"status": STATUS.value, "technique": "T1129", "usage": USAGE.name}
'technique': 'T1129',
'usage': USAGE.name}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -5,11 +5,11 @@ from infection_monkey.model import VictimHost
from infection_monkey.telemetry.attack.t1197_telem import T1197Telem from infection_monkey.telemetry.attack.t1197_telem import T1197Telem
DOMAIN_NAME = 'domain-name' DOMAIN_NAME = "domain-name"
IP = '127.0.0.1' IP = "127.0.0.1"
MACHINE = VictimHost(IP, DOMAIN_NAME) MACHINE = VictimHost(IP, DOMAIN_NAME)
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
USAGE_STR = '[Usage info]' USAGE_STR = "[Usage info]"
@pytest.fixture @pytest.fixture
@ -19,10 +19,11 @@ def T1197_telem_test_instance():
def test_T1197_send(T1197_telem_test_instance, spy_send_telemetry): def test_T1197_send(T1197_telem_test_instance, spy_send_telemetry):
T1197_telem_test_instance.send() T1197_telem_test_instance.send()
expected_data = {'machine': {'domain_name': DOMAIN_NAME, expected_data = {
'ip_addr': IP}, "machine": {"domain_name": DOMAIN_NAME, "ip_addr": IP},
'status': STATUS.value, "status": STATUS.value,
'technique': 'T1197', "technique": "T1197",
'usage': USAGE_STR} "usage": USAGE_STR,
}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -5,9 +5,9 @@ from infection_monkey.model import VictimHost
from infection_monkey.telemetry.attack.t1222_telem import T1222Telem from infection_monkey.telemetry.attack.t1222_telem import T1222Telem
COMMAND = 'echo hi' COMMAND = "echo hi"
DOMAIN_NAME = 'domain-name' DOMAIN_NAME = "domain-name"
IP = '127.0.0.1' IP = "127.0.0.1"
MACHINE = VictimHost(IP, DOMAIN_NAME) MACHINE = VictimHost(IP, DOMAIN_NAME)
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
@ -19,10 +19,11 @@ def T1222_telem_test_instance():
def test_T1222_send(T1222_telem_test_instance, spy_send_telemetry): def test_T1222_send(T1222_telem_test_instance, spy_send_telemetry):
T1222_telem_test_instance.send() T1222_telem_test_instance.send()
expected_data = {'machine': {'domain_name': DOMAIN_NAME, expected_data = {
'ip_addr': IP}, "machine": {"domain_name": DOMAIN_NAME, "ip_addr": IP},
'status': STATUS.value, "status": STATUS.value,
'technique': 'T1222', "technique": "T1222",
'command': COMMAND} "command": COMMAND,
}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -5,7 +5,7 @@ from infection_monkey.telemetry.attack.usage_telem import UsageTelem
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
TECHNIQUE = 'T9999' TECHNIQUE = "T9999"
USAGE = UsageEnum.SMB USAGE = UsageEnum.SMB
@ -16,8 +16,10 @@ def usage_telem_test_instance():
def test_usage_telem_send(usage_telem_test_instance, spy_send_telemetry): def test_usage_telem_send(usage_telem_test_instance, spy_send_telemetry):
usage_telem_test_instance.send() usage_telem_test_instance.send()
expected_data = {'status': STATUS.value, expected_data = {
'technique': TECHNIQUE, "status": STATUS.value,
'usage': USAGE.name} "technique": TECHNIQUE,
"usage": USAGE.name,
}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -5,11 +5,11 @@ from infection_monkey.model import VictimHost
from infection_monkey.telemetry.attack.victim_host_telem import VictimHostTelem from infection_monkey.telemetry.attack.victim_host_telem import VictimHostTelem
DOMAIN_NAME = 'domain-name' DOMAIN_NAME = "domain-name"
IP = '127.0.0.1' IP = "127.0.0.1"
MACHINE = VictimHost(IP, DOMAIN_NAME) MACHINE = VictimHost(IP, DOMAIN_NAME)
STATUS = ScanStatus.USED STATUS = ScanStatus.USED
TECHNIQUE = 'T9999' TECHNIQUE = "T9999"
@pytest.fixture @pytest.fixture
@ -19,9 +19,10 @@ def victim_host_telem_test_instance():
def test_victim_host_telem_send(victim_host_telem_test_instance, spy_send_telemetry): def test_victim_host_telem_send(victim_host_telem_test_instance, spy_send_telemetry):
victim_host_telem_test_instance.send() victim_host_telem_test_instance.send()
expected_data = {'machine': {'domain_name': DOMAIN_NAME, expected_data = {
'ip_addr': IP}, "machine": {"domain_name": DOMAIN_NAME, "ip_addr": IP},
'status': STATUS.value, "status": STATUS.value,
'technique': TECHNIQUE} "technique": TECHNIQUE,
}
assert spy_send_telemetry.data == expected_data assert spy_send_telemetry.data == expected_data
assert spy_send_telemetry.telem_category == 'attack' assert spy_send_telemetry.telem_category == "attack"

View File

@ -11,5 +11,5 @@ def spy_send_telemetry(monkeypatch):
_spy_send_telemetry.telem_category = None _spy_send_telemetry.telem_category = None
_spy_send_telemetry.data = None _spy_send_telemetry.data = None
monkeypatch.setattr(ControlClient, 'send_telemetry', _spy_send_telemetry) monkeypatch.setattr(ControlClient, "send_telemetry", _spy_send_telemetry)
return _spy_send_telemetry return _spy_send_telemetry

View File

@ -8,22 +8,26 @@ from infection_monkey.telemetry.exploit_telem import ExploitTelem
DOMAIN_NAME = "domain-name" DOMAIN_NAME = "domain-name"
IP = "0.0.0.0" IP = "0.0.0.0"
HOST = VictimHost(IP, DOMAIN_NAME) HOST = VictimHost(IP, DOMAIN_NAME)
HOST_AS_DICT = {'ip_addr': IP, HOST_AS_DICT = {
'domain_name': DOMAIN_NAME, "ip_addr": IP,
'os': {}, "domain_name": DOMAIN_NAME,
'services': {}, "os": {},
'icmp': False, "services": {},
'monkey_exe': None, "icmp": False,
'default_tunnel': None, "monkey_exe": None,
'default_server': None} "default_tunnel": None,
"default_server": None,
}
EXPLOITER = WmiExploiter(HOST) EXPLOITER = WmiExploiter(HOST)
EXPLOITER_NAME = 'WmiExploiter' EXPLOITER_NAME = "WmiExploiter"
EXPLOITER_INFO = {'display_name': WmiExploiter._EXPLOITED_SERVICE, EXPLOITER_INFO = {
'started': '', "display_name": WmiExploiter._EXPLOITED_SERVICE,
'finished': '', "started": "",
'vulnerable_urls': [], "finished": "",
'vulnerable_ports': [], "vulnerable_urls": [],
'executed_cmds': []} "vulnerable_ports": [],
"executed_cmds": [],
}
EXPLOITER_ATTEMPTS = [] EXPLOITER_ATTEMPTS = []
RESULT = False RESULT = False

View File

@ -2,10 +2,12 @@ import pytest
from common.data.post_breach_consts import POST_BREACH_JOB_SCHEDULING from common.data.post_breach_consts import POST_BREACH_JOB_SCHEDULING
from infection_monkey.post_breach.actions.schedule_jobs import ScheduleJobs from infection_monkey.post_breach.actions.schedule_jobs import ScheduleJobs
from infection_monkey.post_breach.job_scheduling.linux_job_scheduling import \ from infection_monkey.post_breach.job_scheduling.linux_job_scheduling import (
get_linux_commands_to_schedule_jobs get_linux_commands_to_schedule_jobs,
from infection_monkey.post_breach.job_scheduling.windows_job_scheduling import \ )
get_windows_commands_to_schedule_jobs from infection_monkey.post_breach.job_scheduling.windows_job_scheduling import (
get_windows_commands_to_schedule_jobs,
)
from infection_monkey.telemetry.post_breach_telem import PostBreachTelem from infection_monkey.telemetry.post_breach_telem import PostBreachTelem
from infection_monkey.utils.environment import is_windows_os from infection_monkey.utils.environment import is_windows_os
@ -13,8 +15,11 @@ from infection_monkey.utils.environment import is_windows_os
HOSTNAME = "hostname" HOSTNAME = "hostname"
IP = "0.0.0.0" IP = "0.0.0.0"
PBA = ScheduleJobs() PBA = ScheduleJobs()
PBA_COMMAND = get_windows_commands_to_schedule_jobs() if is_windows_os() else\ PBA_COMMAND = (
' '.join(get_linux_commands_to_schedule_jobs()) get_windows_commands_to_schedule_jobs()
if is_windows_os()
else " ".join(get_linux_commands_to_schedule_jobs())
)
PBA_NAME = POST_BREACH_JOB_SCHEDULING PBA_NAME = POST_BREACH_JOB_SCHEDULING
RESULT = False RESULT = False

View File

@ -3,17 +3,20 @@ import pytest
from infection_monkey.telemetry.scan_telem import ScanTelem from infection_monkey.telemetry.scan_telem import ScanTelem
from infection_monkey.model.host import VictimHost from infection_monkey.model.host import VictimHost
DOMAIN_NAME = "domain-name" DOMAIN_NAME = "domain-name"
IP = "0.0.0.0" IP = "0.0.0.0"
HOST = VictimHost(IP, DOMAIN_NAME) HOST = VictimHost(IP, DOMAIN_NAME)
HOST_AS_DICT = {'ip_addr': IP, HOST_AS_DICT = {
'domain_name': DOMAIN_NAME, "ip_addr": IP,
'os': {}, "domain_name": DOMAIN_NAME,
'services': {}, "os": {},
'icmp': False, "services": {},
'monkey_exe': None, "icmp": False,
'default_tunnel': None, "monkey_exe": None,
'default_server': None} "default_tunnel": None,
"default_server": None,
}
HOST_SERVICES = {} HOST_SERVICES = {}

View File

@ -2,6 +2,7 @@ import pytest
from infection_monkey.telemetry.state_telem import StateTelem from infection_monkey.telemetry.state_telem import StateTelem
IS_DONE = True IS_DONE = True
VERSION = "version" VERSION = "version"

View File

@ -2,6 +2,7 @@ import pytest
from infection_monkey.telemetry.system_info_telem import SystemInfoTelem from infection_monkey.telemetry.system_info_telem import SystemInfoTelem
SYSTEM_INFO = {} SYSTEM_INFO = {}

View File

@ -2,6 +2,7 @@ import pytest
from infection_monkey.telemetry.trace_telem import TraceTelem from infection_monkey.telemetry.trace_telem import TraceTelem
MSG = "message" MSG = "message"