monkey/infection_monkey
Vakaris 7e2cc86ab9 Code cleaned and tested on ubuntu 2018-08-29 16:55:35 +03:00
..
exploit Code cleaned and tested on ubuntu 2018-08-29 16:55:35 +03:00
model Notes fixed v.2 2018-08-15 16:01:27 +03:00
monkey_utils/sambacry_monkey_runner rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
network Uploaded and modified standard web_rce code usage.Not working, not tested 2018-08-29 16:55:35 +03:00
system_info Merge branch 'develop' into SSH_key_stealing 2018-06-05 16:59:28 +03:00
transport Added functions get_monkey_paths and run_backup_commands 2018-08-28 20:51:25 +03:00
build_linux.sh rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
build_windows.bat rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
config.py Notes fixed and tested 2018-08-29 14:43:39 +03:00
control.py Merge branch 'develop' into bugfix/upgrade-windows-32-to-64 2018-04-11 19:21:52 +03:00
dropper.py Changed to a better file comparison function 2018-07-18 20:48:15 +03:00
example.conf Core functions of Oracle weblogic rce 2018-08-29 14:43:39 +03:00
main.py Fix race-condition bug on upgrade 2018-04-11 20:59:23 +03:00
monkey-linux.spec Move range to common code folder 2018-02-26 18:39:49 +02:00
monkey.ico Update icons 2018-02-27 19:39:32 +02:00
monkey.py from six import string_types, text_type, xrange (#128) 2018-05-22 11:13:18 +03:00
monkey.spec Move range to common code folder 2018-02-26 18:39:49 +02:00
monkeyfs.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
readme.txt rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
requirements.txt Remove Monkey testing code, dead code as it is. 2018-05-23 15:22:27 +03:00
system_singleton.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
tunnel.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
utils.py Rename check for 64-bit to make explict it's a windows only check 2018-04-12 17:57:21 +03:00
windows_upgrader.py Bugfix when upgrading the monkey without admin permissions. 2018-04-17 11:27:35 +03:00

readme.txt

How to build a monkey binary from scratch.

The monkey is composed of three separate parts.
* The Infection Monkey itself - PyInstaller compressed python archives
* Sambacry binaries - Two linux binaries, 32/64 bit.
* Mimikatz binaries - Two windows binaries, 32/64 bit.

--- Windows ---

1. Install python 2.7. Preferably you should use ActiveState Python which includes pywin32 built in. 
    You must use an up to date version, at least version 2.7.10
    https://www.python.org/download/releases/2.7/
2.	Install pywin32 (if you didn't install ActiveState Python)
	Install pywin32, minimum build 219
		http://sourceforge.net/projects/pywin32/files/pywin32
3.	Add python directories to PATH environment variable (if you didn't install ActiveState Python)
	a. Run the following command on a cmd console (Replace C:\Python27 with your python directory if it's different)
		setx /M PATH "%PATH%;C:\Python27;C:\Pytohn27\Scripts
	b. Close the console, make sure you execute all commands in a new cmd console from now on.
4.	Install pip
	a. Download and run the pip installer
	https://bootstrap.pypa.io/get-pip.py
5.	Install further dependencies
	a. install VCForPython27.msi
		https://aka.ms/vcpython27
	b. if not installed, install Microsoft Visual C++ 2010 SP1 Redistributable Package
		32bit: http://www.microsoft.com/en-us/download/details.aspx?id=8328
		64bit: http://www.microsoft.com/en-us/download/details.aspx?id=13523
6.	Download the dependent python packages using 
		pip install -r requirements.txt
7.	Download and extract UPX binary to [source-path]\monkey\infection_monkey\bin\upx.exe:
		https://github.com/upx/upx/releases/download/v3.94/upx394w.zip
8.	Build/Download Sambacry and Mimikatz binaries
	a. Build/Download according to sections at the end of this readme.
	b. Place the binaries under [code location]\infection_monkey\bin
9.	To build the final exe:
		cd [code location]/infection_monkey
		build_windows.bat 
		output is placed under dist\monkey.exe

--- Linux ---

Tested on Ubuntu 16.04 and 17.04.

1.	Install dependencies by running:
		sudo apt-get update
		sudo apt-get install python-pip python-dev libffi-dev upx libssl-dev libc++1
    Install the python packages listed in requirements.txt using pip
        cd [code location]/infection_monkey
		pip install -r requirements.txt
2.	Build Sambacry binaries
	a. Build/Download according to sections at the end of this readme.
	b. Place the binaries under [code location]\infection_monkey\bin
3.	To build, run in terminal:
		cd [code location]/infection_monkey
		chmod +x build_linux.sh
		./build_linux.sh
	output is placed under dist/monkey

-- Sambacry --

Sambacry requires two standalone binaries to execute remotely.
1.	Install gcc-multilib if it's not installed
	sudo apt-get install gcc-multilib
2.	Build the binaries
	cd [code location]/infection_monkey/monkey_utils/sambacry_monkey_runner
	./build.sh

-- Mimikatz --

Mimikatz is required for the Monkey to be able to steal credentials on Windows. It's possible to either compile from sources (requires Visual Studio 2013 and up) or download the binaries from 
https://github.com/guardicore/mimikatz/releases/tag/1.0.0
Download both 32 and 64 bit DLLs and place them under [code location]\infection_monkey\bin