forked from p34709852/monkey
Agent: Remove POC Docker Service
This commit is contained in:
parent
c2db37df1e
commit
b94c8e54e2
|
@ -1,11 +1,10 @@
|
|||
from typing import List
|
||||
|
||||
from .i_service_exploiter import IServiceExploiter
|
||||
from .poc_docker import DockerPOCExploit
|
||||
from .solr import SolrExploit
|
||||
from .tomcat import TomcatExploit
|
||||
from .logstash import LogStashExploit
|
||||
|
||||
|
||||
def get_log4shell_service_exploiters() -> List[IServiceExploiter]:
|
||||
return [DockerPOCExploit(), SolrExploit(), TomcatExploit(), LogStashExploit()]
|
||||
return [SolrExploit(), TomcatExploit(), LogStashExploit()]
|
||||
|
|
|
@ -1,22 +0,0 @@
|
|||
from logging import getLogger
|
||||
|
||||
import requests
|
||||
|
||||
from infection_monkey.exploit.log4shell_utils.service_exploiters import IServiceExploiter
|
||||
from infection_monkey.model import VictimHost
|
||||
|
||||
logger = getLogger(__name__)
|
||||
|
||||
|
||||
class DockerPOCExploit(IServiceExploiter):
|
||||
|
||||
service_name = "GoFinance mock application"
|
||||
|
||||
@staticmethod
|
||||
def trigger_exploit(payload: str, host: VictimHost, port: int):
|
||||
url = f"http://{host.ip_addr}:{port}/login"
|
||||
payload = {"uname": payload, "password": "m0nk3y"}
|
||||
try:
|
||||
resp = requests.post(url, data=payload, timeout=5, verify=False) # noqa DUO123
|
||||
except requests.ReadTimeout as e:
|
||||
logger.debug(f"Log4shell request failed {e}")
|
Loading…
Reference in New Issue