monkey/envs/monkey_zoo/blackbox/test_configurations/depth_2_a.py

43 lines
1.5 KiB
Python
Raw Normal View History

from common.agent_configuration import AgentConfiguration, PluginConfiguration
2022-07-20 01:15:13 +08:00
from common.credentials import Credentials, Password, Username
from .noop import noop_test_configuration
from .utils import add_exploiters, add_subnets, add_tcp_ports, set_maximum_depth
2022-07-20 01:15:13 +08:00
2022-07-20 01:31:16 +08:00
# Tests:
# SSH password and key brute-force, key stealing (10.2.2.11, 10.2.2.12)
2022-07-20 01:15:13 +08:00
def _add_exploiters(agent_configuration: AgentConfiguration) -> AgentConfiguration:
brute_force = [
PluginConfiguration(name="SSHExploiter", options={}),
]
return add_exploiters(agent_configuration, brute_force=brute_force, vulnerability=[])
def _add_subnets(agent_configuration: AgentConfiguration) -> AgentConfiguration:
subnets = [
"10.2.2.11",
"10.2.2.12",
]
return add_subnets(agent_configuration, subnets)
def _add_tcp_ports(agent_configuration: AgentConfiguration) -> AgentConfiguration:
ports = [22]
return add_tcp_ports(agent_configuration, ports)
test_agent_configuration = set_maximum_depth(noop_test_configuration.agent_configuration, 2)
test_agent_configuration = _add_exploiters(test_agent_configuration)
test_agent_configuration = _add_subnets(test_agent_configuration)
test_agent_configuration = _add_tcp_ports(test_agent_configuration)
2022-07-20 01:15:13 +08:00
CREDENTIALS = (
Credentials(Username("m0nk3y"), None),
Credentials(None, Password("^NgDvY59~8")),
)
depth_2_a_test_configuration = noop_test_configuration.copy()
depth_2_a_test_configuration.agent_configuration = test_agent_configuration
depth_2_a_test_configuration.propagation_credentials = CREDENTIALS