diff --git a/monkey/infection_monkey/config.py b/monkey/infection_monkey/config.py index 5e2c3ec21..5111bae48 100644 --- a/monkey/infection_monkey/config.py +++ b/monkey/infection_monkey/config.py @@ -197,8 +197,8 @@ class Configuration(object): # ransomware config ########################### - windows_dir = "" - linux_dir = "" + windows_dir_ransom = "" + linux_dir_ransom = "" def get_exploit_user_password_pairs(self): """ diff --git a/monkey/monkey_island/cc/services/config_schema/ransomware.py b/monkey/monkey_island/cc/services/config_schema/ransomware.py index 83619b0b4..b5d250f00 100644 --- a/monkey/monkey_island/cc/services/config_schema/ransomware.py +++ b/monkey/monkey_island/cc/services/config_schema/ransomware.py @@ -1 +1,26 @@ -RANSOMWARE = {"linux_dir": "", "windows_dir": ""} +RANSOMWARE = { + "title": "Ransomware", + "type": "object", + "properties": { + "directories": { + "title": "Directories to encrypt", + "type": "object", + "properties": { + "linux_dir_ransom": { + "title": "Linux encryptable directory", + "type": "string", + "default": "", + "description": "Files in the specified directory will be encrypted " + "using bitflip to simulate ransomware.", + }, + "windows_dir_ransom": { + "title": "Windows encryptable directory", + "type": "string", + "default": "", + "description": "Files in the specified directory will be encrypted " + "using bitflip to simulate ransomware.", + }, + }, + } + }, +}