Removed legacy ChaosMonkey from SMB execution.

This commit is contained in:
danielguardicore 2016-09-07 19:10:30 +03:00
parent 9f27825789
commit d2203b2220
3 changed files with 4 additions and 1 deletions

View File

@ -208,6 +208,8 @@ class Configuration(object):
# smb/wmi exploiter
smb_download_timeout = 300 # timeout in seconds
smb_service_name = "InfectionMonkey"
# system info collection
collect_system_info = True

View File

@ -66,6 +66,7 @@
"range_size": 30,
"rdp_use_vbs_download": true,
"smb_download_timeout": 300,
"smb_service_name": "InfectionMonkey",
"retry_failed_explotation": true,
"scanner_class": "TcpScanner",
"self_delete_in_cleanup": true,

View File

@ -141,7 +141,7 @@ class SmbExploiter(HostExploiter):
sc_handle = resp['lpScHandle']
# start the monkey using the SCM
resp = scmr.hRCreateServiceW(scmr_rpc, sc_handle, "Chaos Monkey", "Chaos Monkey",
resp = scmr.hRCreateServiceW(scmr_rpc, sc_handle, self._config.smb_service_name, self._config.smb_service_name,
lpBinaryPathName=cmdline)
service = resp['lpServiceHandle']