Reverted bug in config, added 'user' to default bruteforce.

This commit is contained in:
daniel goldberg 2016-08-30 11:04:44 +03:00
parent 6a51e926f8
commit 12ff0c5677
2 changed files with 8 additions and 7 deletions

View File

@ -44,7 +44,6 @@ def _cast_by_example(value, example):
class Configuration(object):
def from_dict(self, data):
for key, value in data.items():
if key.startswith('_'):
@ -134,9 +133,9 @@ class Configuration(object):
scanner_class = TcpScanner
finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger]
exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits
exploiter_classes = [SmbExploiter, WmiExploiter, RdpExploiter, Ms08_067_Exploiter, # Windows exploits
SSHExploiter, ShellShockExploiter # Linux
]
]
# how many victims to look for in a single scan iteration
victims_max_find = 14
@ -167,11 +166,11 @@ class Configuration(object):
###########################
# Auto detect and scan local subnets
local_network_scan = False
local_network_scan = True
range_class = FixedRange
range_size = 1
range_fixed = ['']
range_fixed = ['',]
# TCP Scanner
HTTP_PORTS = [80, 8080, 443,
@ -201,7 +200,7 @@ class Configuration(object):
psexec_passwords = ["Password1!", "1234", "password", "12345678"]
# ssh exploiter
ssh_users = ["root",'user']
ssh_users = ["root", 'user']
ssh_passwords = ["Password1!", "1234", "password", "12345678"]
# rdp exploiter
@ -210,4 +209,5 @@ class Configuration(object):
# system info collection
collect_system_info = True
WormConfiguration = Configuration()

View File

@ -72,7 +72,8 @@
"singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}",
"skip_exploit_if_file_exist": true,
"ssh_users": [
"root"
"root",
"user"
],
"local_network_scan": true,
"tcp_scan_get_banner": true,