From 696dd83ef682a901e2dbec0cce4403a8001ad4a9 Mon Sep 17 00:00:00 2001 From: VakarisZ Date: Fri, 24 Jul 2020 09:45:17 +0300 Subject: [PATCH] Changed exploiter documentation links in config --- .../definitions/exploiter_classes.py | 24 +++++++++---------- 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py index 0b9e97fa1..604ba2073 100644 --- a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py +++ b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py @@ -15,7 +15,7 @@ EXPLOITER_CLASSES = { "attack_techniques": ["T1110", "T1075", "T1035"], "info": "Brute forces using credentials provided by user and" " hashes gathered by mimikatz.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/smbexec/" }, { "type": "string", @@ -26,7 +26,7 @@ EXPLOITER_CLASSES = { "attack_techniques": ["T1110", "T1106"], "info": "Brute forces WMI (Windows Management Instrumentation) " "using credentials provided by user and hashes gathered by mimikatz.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/wmiexec/" }, { "type": "string", @@ -37,7 +37,7 @@ EXPLOITER_CLASSES = { "attack_techniques": ["T1110"], "info": "Tries to brute force into MsSQL server and uses insecure " "configuration to execute commands on server.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/mssql/" }, { "type": "string", @@ -47,7 +47,7 @@ EXPLOITER_CLASSES = { "title": "MS08-067 Exploiter (UNSAFE)", "info": "Unsafe exploiter, that might cause system crash due to the use of buffer overflow. " "Uses MS08-067 vulnerability.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/ms08-067/" }, { "type": "string", @@ -57,7 +57,7 @@ EXPLOITER_CLASSES = { "title": "SSH Exploiter", "attack_techniques": ["T1110", "T1145", "T1106"], "info": "Brute forces using credentials provided by user and SSH keys gathered from systems.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/sshexec/" }, { "type": "string", @@ -67,7 +67,7 @@ EXPLOITER_CLASSES = { "title": "ShellShock Exploiter", "info": "CVE-2014-6271, based on logic from " "https://github.com/nccgroup/shocker/blob/master/shocker.py .", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/shellshock/" }, { "type": "string", @@ -76,7 +76,7 @@ EXPLOITER_CLASSES = { ], "title": "SambaCry Exploiter", "info": "Bruteforces and searches for anonymous shares. Uses Impacket.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/sambacry/" }, { "type": "string", @@ -85,7 +85,7 @@ EXPLOITER_CLASSES = { ], "title": "ElasticGroovy Exploiter", "info": "CVE-2015-1427. Logic is based on Metasploit module.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/elasticgroovy/" }, { "type": "string", @@ -95,7 +95,7 @@ EXPLOITER_CLASSES = { "title": "Struts2 Exploiter", "info": "Exploits struts2 java web framework. CVE-2017-5638. Logic based on " "https://www.exploit-db.com/exploits/41570 .", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/struts2/" }, { "type": "string", @@ -104,7 +104,7 @@ EXPLOITER_CLASSES = { ], "title": "WebLogic Exploiter", "info": "Exploits CVE-2017-10271 and CVE-2019-2725 vulnerabilities on WebLogic server.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/weblogic/" }, { "type": "string", @@ -114,7 +114,7 @@ EXPLOITER_CLASSES = { "title": "Hadoop/Yarn Exploiter", "info": "Remote code execution on HADOOP server with YARN and default settings. " "Logic based on https://github.com/vulhub/vulhub/tree/master/hadoop/unauthorized-yarn.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/hadoop/" }, { "type": "string", @@ -124,7 +124,7 @@ EXPLOITER_CLASSES = { "title": "VSFTPD Exploiter", "info": "Exploits a malicious backdoor that was added to the VSFTPD download archive. " "Logic based on Metasploit module.", - "link": "https://github.com/guardicore/monkey/wiki/Exploiters" + "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/vsftpd/" } ] }