diff --git a/chaos_monkey/example.conf b/chaos_monkey/example.conf new file mode 100644 index 000000000..28bac42ce --- /dev/null +++ b/chaos_monkey/example.conf @@ -0,0 +1,72 @@ +{ + "alive": true, + "collect_system_info": true, + "command_servers": [ + "russian-mail-brides.com:5000", + "127.0.0.1:5000" + ], + "current_server": "127.0.0.1:5000", + "dropper_date_reference_path": "/bin/sh", + "dropper_log_path": "/tmp/user-1562", + "dropper_set_date": true, + "dropper_target_path": "C:\\Windows\\monkey.exe", + "dropper_target_path_linux": "/bin/monkey", + "dropper_try_move_first": false, + "exploiter_classes": [ + "SSHExploiter", + "SmbExploiter", + "WmiExploiter", + "RdpExploiter", + "Ms08_067_Exploiter" + ], + "finger_classes": [ + "SSHFinger", + "PingScanner", + "SMBFinger" + ], + "max_iterations": 3, + "monkey_log_path": "/tmp/user-1563", + "ms08_067_exploit_attempts": 5, + "ms08_067_remote_user_add": "IUSER_SUPPORT", + "ms08_067_remote_user_pass": "Password1!", + "ping_scan_timeout": 10000, + "psexec_passwords": [ + "Password1!", + "1234", + "password", + "12345678" + ], + "psexec_user": "Administrator", + "range_class": "RelativeRange", + "range_fixed": [ + "" + ], + "range_size": 30, + "rdp_use_vbs_download": true, + "retry_failed_explotation": true, + "scanner_class": "TcpScanner", + "self_delete_in_cleanup": false, + "serialize_config": true, + "singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}", + "skip_exploit_if_file_exist": true, + "ssh_passwords": [ + "Password1!", + "1234", + "password", + "12345678" + ], + "ssh_user": "root", + "tcp_scan_get_banner": true, + "tcp_scan_interval": 200, + "tcp_scan_timeout": 10000, + "tcp_target_ports": [ + 22, + 445, + 135, + 3389 + ], + "timeout_between_iterations": 10, + "use_file_logging": true, + "victims_max_exploit": 7, + "victims_max_find": 14 +} \ No newline at end of file