forked from p15670423/monkey
Reverted bug in config, added 'user' to default bruteforce.
This commit is contained in:
parent
6a51e926f8
commit
12ff0c5677
|
@ -44,7 +44,6 @@ def _cast_by_example(value, example):
|
|||
|
||||
|
||||
class Configuration(object):
|
||||
|
||||
def from_dict(self, data):
|
||||
for key, value in data.items():
|
||||
if key.startswith('_'):
|
||||
|
@ -167,11 +166,11 @@ class Configuration(object):
|
|||
###########################
|
||||
|
||||
# Auto detect and scan local subnets
|
||||
local_network_scan = False
|
||||
local_network_scan = True
|
||||
|
||||
range_class = FixedRange
|
||||
range_size = 1
|
||||
range_fixed = ['']
|
||||
range_fixed = ['',]
|
||||
|
||||
# TCP Scanner
|
||||
HTTP_PORTS = [80, 8080, 443,
|
||||
|
@ -201,7 +200,7 @@ class Configuration(object):
|
|||
psexec_passwords = ["Password1!", "1234", "password", "12345678"]
|
||||
|
||||
# ssh exploiter
|
||||
ssh_users = ["root",'user']
|
||||
ssh_users = ["root", 'user']
|
||||
ssh_passwords = ["Password1!", "1234", "password", "12345678"]
|
||||
|
||||
# rdp exploiter
|
||||
|
@ -210,4 +209,5 @@ class Configuration(object):
|
|||
# system info collection
|
||||
collect_system_info = True
|
||||
|
||||
|
||||
WormConfiguration = Configuration()
|
||||
|
|
|
@ -72,7 +72,8 @@
|
|||
"singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}",
|
||||
"skip_exploit_if_file_exist": true,
|
||||
"ssh_users": [
|
||||
"root"
|
||||
"root",
|
||||
"user"
|
||||
],
|
||||
"local_network_scan": true,
|
||||
"tcp_scan_get_banner": true,
|
||||
|
|
Loading…
Reference in New Issue