Commit Graph

48 Commits

Author SHA1 Message Date
Itay Mizeretz 3014763e99 minor fixes 2017-09-04 15:41:36 +03:00
Itay Mizeretz cc889f9124 Fix CR 2017-09-04 14:52:24 +03:00
Itay Mizeretz c8d7a2c4d3 SambaCry now works for both 32,64bit 2017-09-03 11:50:01 +03:00
Itay Mizeretz c612ea0361 Documented sambacry, moved everything to configuration, minor fixes 2017-08-31 20:03:32 +03:00
Itay Mizeretz 5de433eae0 sambacry works
default monkey binary in linux is now 64bit
2017-08-31 18:40:42 +03:00
Itay Mizeretz 194ed624c2 sambacry almost working e2e 2017-08-31 17:50:55 +03:00
Itay Mizeretz 4ce1653c8f sambacry: Add support for using both architectures 2017-08-30 10:16:54 +03:00
Itay Mizeretz 7d72150e4e Add working POC of sambacry. still needs some modifications to fir monkey, and minor functionality 2017-08-28 19:20:44 +03:00
Itay Mizeretz 57e69fafee minor fix in dropper
Rename constants
2017-08-28 10:41:11 +03:00
Itay Mizeretz 97205e6427 Fix config property bug 2017-08-21 11:51:47 +03:00
Itay Mizeretz 26df64fb87 Fixed CR 2017-08-20 19:32:18 +03:00
Itay Mizeretz 1a55c8362f Add C&C ability to share credentials found from monkeys 2017-08-17 18:04:36 +03:00
Itay Mizeretz a671b55df3 Add mimikatz collector
Combine all users and passwords in config
2017-08-16 15:14:26 +03:00
daniel goldberg ab7f731ed5 Removed reliance on grequests. Complicates other code and no real performance improvement in a LAN enviornment. 2016-09-21 14:55:13 +03:00
itsikkes 155a03efad Small hack to support fast-user switching when RDPing to already loggen-in host
Although it doesn't always happen, because there is no easy wasy to know
- trying  to press YES on the dialog box (if any) can help the login
process
2016-09-19 22:27:17 +03:00
itsikkes b3322b2541 improved local interface selection when exploiting 2016-09-08 12:30:40 +03:00
danielguardicore d2203b2220 Removed legacy ChaosMonkey from SMB execution. 2016-09-07 19:10:30 +03:00
danielguardicore ce3eaa9b2e Fixed grequsts/gevents monkey patching of socket code, which lead to paramiko being unable to function after a shellshock scan. 2016-09-07 10:16:17 +03:00
itsikkes 39eaca300f RDP: change VBS object to reduce requirements + process is more verbose 2016-09-06 11:05:15 +03:00
daniel goldberg 32c326bd7b PEP8 in diff files
Add concept of non default timeout for copying SMB files. This is by default 5 minutes.
Changed behavior of SMB exploiter if file already exists, we don't assume exploitation is useless and try again. Worse case is we run the monkey after it finished running.
Changed behavior if managed to connect to machine to IPC$ over some dialect. If Success, we don't try again.
2016-09-05 17:45:27 +03:00
daniel goldberg 91427eb346 Tiny PEP8 change and changed reporting of vulnerable URLs in shellshock 2016-08-29 18:58:16 +03:00
daniel goldberg d80c670392 Fixed bug in HTTPFingering
Added support for skip_exploit_if_file_exists in linux exploiters.
Delayed/fixed a race in the monkey patching that gevents does.
2016-08-29 18:58:16 +03:00
daniel goldberg cd27438a1e PEP 8 changes 2016-08-29 18:58:15 +03:00
daniel goldberg 1806f9bc62 Issue #33 - Added support for skip_exploit_if_file_exist in linux 2016-08-29 13:34:21 +03:00
daniel goldberg a322a619cb Issue 23 - Added shellshock exploit. 2016-08-29 12:09:46 +03:00
acepace 88951f920d Bunch of generic PEP8 improvements 2016-08-20 17:03:49 +03:00
acepace 8f1669dd44 Added functionality to report all brute force password attempts even if unsuccessful. 2016-08-09 00:23:18 +03:00
acepace d75ce529ab Issue #18, added ability to attack multiple users in SSH brute force.
Also fixed small bug in windows kill path parsing.
2016-08-08 22:25:33 +03:00
itsikkes 76e3350fa3 merge duplicate code 2016-07-26 18:52:58 +03:00
itsikkes e26f849286 RDP module bugfix 2016-07-23 08:41:57 +03:00
itsikkes ad6b7a9893 missing parent flag 2016-07-21 11:22:01 +03:00
itsikkes 4a42fc540e fixes and improvements after test-run 1 2016-07-20 00:53:41 +03:00
acepace 6a486165e5 Fixed broken imports 2016-03-01 13:19:45 +02:00
urihershgc a0e87a82f7 GC-5050: better range calculation 2016-01-13 10:27:49 +02:00
urihershgc 0ec19578c3 GC-4599: added depth parameter 2015-12-07 19:08:15 +02:00
urihershgc 3522e6e02d GC-4600: monkey is propagating current C&C server 2015-12-03 16:38:50 +02:00
urihershgc d984641f53 code organization #2 2015-11-30 14:11:19 +02:00
urihershgc 048c989b27 code organization 2015-11-30 10:56:20 +02:00
Barak Hoffer 6169f1f42e added default tunnel is the exploiter
added self delete on cleanup
fixed argument parsing
2015-10-14 17:22:05 +03:00
Barak Hoffer 4731df114c fixed ssh on different port bugs 2015-10-12 17:42:54 +03:00
Barak Hoffer edc0f5fdf3 add support for c&c tunneling
"GC-3595 #resolve"
2015-10-08 13:39:52 +03:00
Barak Hoffer a19f820ec8 - windows firewall add rules support
- exploit with our monkey if suitable
2015-10-08 13:35:52 +03:00
Barak Hoffer 760d267459 minor bug fixes 2015-10-08 13:32:26 +03:00
Barak Hoffer bc74029c7a minor bug fix 2015-10-01 10:12:17 +03:00
Barak Hoffer 73f9821ee4 minor bug fix 2015-09-30 15:05:30 +03:00
Barak Hoffer 8dc7b38d56 - c&c
- support for virtual files (monkeyfs)
- ssh exploitation
- some linux support issues fixed
2015-09-29 17:58:06 +03:00
Barak Hoffer 01bc17f80c - rdp exploitation
- http file transfer
- ftp server code for future support
2015-09-07 10:25:25 +03:00
Itamar Tal 120d259b65 first commit 2015-08-30 10:27:35 +03:00