forked from p15670423/monkey
Agent: Move ransomware/ to payload/ransomware/
This commit is contained in:
parent
09a1297f47
commit
33e3a31030
|
@ -1,4 +1,4 @@
|
||||||
monkey/tests/data_for_tests/ransomware_targets/** -text
|
monkey/tests/data_for_tests/ransomware_targets/** -text
|
||||||
monkey/tests/data_for_tests/test_readme.txt -text
|
monkey/tests/data_for_tests/test_readme.txt -text
|
||||||
monkey/tests/data_for_tests/stable_file.txt -text
|
monkey/tests/data_for_tests/stable_file.txt -text
|
||||||
monkey/infection_monkey/ransomware/ransomware_readme.txt -text
|
monkey/infection_monkey/payload/ransomware/ransomware_readme.txt -text
|
||||||
|
|
|
@ -12,8 +12,8 @@ from tests.unit_tests.infection_monkey.ransomware.ransomware_target_files import
|
||||||
)
|
)
|
||||||
from tests.utils import is_user_admin
|
from tests.utils import is_user_admin
|
||||||
|
|
||||||
from infection_monkey.ransomware.file_selectors import ProductionSafeTargetFileSelector
|
from infection_monkey.payload.ransomware.file_selectors import ProductionSafeTargetFileSelector
|
||||||
from infection_monkey.ransomware.ransomware_payload import README_SRC
|
from infection_monkey.payload.ransomware.ransomware_payload import README_SRC
|
||||||
|
|
||||||
TARGETED_FILE_EXTENSIONS = [".pdf", ".txt"]
|
TARGETED_FILE_EXTENSIONS = [".pdf", ".txt"]
|
||||||
|
|
||||||
|
|
|
@ -11,7 +11,7 @@ from tests.unit_tests.infection_monkey.ransomware.ransomware_target_files import
|
||||||
)
|
)
|
||||||
|
|
||||||
from common.utils.file_utils import get_file_sha256_hash
|
from common.utils.file_utils import get_file_sha256_hash
|
||||||
from infection_monkey.ransomware.in_place_file_encryptor import InPlaceFileEncryptor
|
from infection_monkey.payload.ransomware.in_place_file_encryptor import InPlaceFileEncryptor
|
||||||
from infection_monkey.utils.bit_manipulators import flip_bits
|
from infection_monkey.utils.bit_manipulators import flip_bits
|
||||||
|
|
||||||
EXTENSION = ".m0nk3y"
|
EXTENSION = ".m0nk3y"
|
||||||
|
|
|
@ -4,8 +4,8 @@ import pytest
|
||||||
from tests.utils import raise_
|
from tests.utils import raise_
|
||||||
|
|
||||||
from common.utils.file_utils import InvalidPath
|
from common.utils.file_utils import InvalidPath
|
||||||
from infection_monkey.ransomware import ransomware_config
|
from infection_monkey.payload.ransomware import ransomware_config
|
||||||
from infection_monkey.ransomware.ransomware_config import RansomwareConfig
|
from infection_monkey.payload.ransomware.ransomware_config import RansomwareConfig
|
||||||
|
|
||||||
LINUX_DIR = "/tmp/test"
|
LINUX_DIR = "/tmp/test"
|
||||||
WINDOWS_DIR = "C:\\tmp\\test"
|
WINDOWS_DIR = "C:\\tmp\\test"
|
||||||
|
|
|
@ -7,9 +7,9 @@ from tests.unit_tests.infection_monkey.ransomware.ransomware_target_files import
|
||||||
TEST_KEYBOARD_TXT,
|
TEST_KEYBOARD_TXT,
|
||||||
)
|
)
|
||||||
|
|
||||||
from infection_monkey.ransomware.consts import README_FILE_NAME, README_SRC
|
from infection_monkey.payload.ransomware.consts import README_FILE_NAME, README_SRC
|
||||||
from infection_monkey.ransomware.ransomware_config import RansomwareConfig
|
from infection_monkey.payload.ransomware.ransomware_config import RansomwareConfig
|
||||||
from infection_monkey.ransomware.ransomware_payload import RansomwarePayload
|
from infection_monkey.payload.ransomware.ransomware_payload import RansomwarePayload
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
import pytest
|
import pytest
|
||||||
|
|
||||||
from common.utils.file_utils import get_file_sha256_hash
|
from common.utils.file_utils import get_file_sha256_hash
|
||||||
from infection_monkey.ransomware.readme_dropper import leave_readme
|
from infection_monkey.payload.ransomware.readme_dropper import leave_readme
|
||||||
|
|
||||||
DEST_FILE = "README.TXT"
|
DEST_FILE = "README.TXT"
|
||||||
README_HASH = "c98c24b677eff44860afea6f493bbaec5bb1c4cbb209c6fc2bbb47f66ff2ad31"
|
README_HASH = "c98c24b677eff44860afea6f493bbaec5bb1c4cbb209c6fc2bbb47f66ff2ad31"
|
||||||
|
|
Loading…
Reference in New Issue