monkey/infection_monkey
Vakaris f45cebfd5e Does not store encrypted or already present ssh keys, shows all users from whom SSH private key were stolen under "stolen credentials" in report 2018-05-25 01:34:24 +03:00
..
exploit EG bugfixes 2018-04-17 14:34:26 +03:00
model Spacing in __str__ method of VictimHost 2018-05-05 16:23:58 +03:00
monkey_utils/sambacry_monkey_runner rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
network Remove class C limitation when getting local subnet 2018-04-12 14:57:22 +03:00
system_info Does not store encrypted or already present ssh keys, shows all users from whom SSH private key were stolen under "stolen credentials" in report 2018-05-25 01:34:24 +03:00
test rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
transport rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
build_linux.sh rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
build_windows.bat rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
config.py SSH keys are now encrypted and added to database 2018-05-24 16:59:22 +03:00
control.py Merge branch 'develop' into bugfix/upgrade-windows-32-to-64 2018-04-11 19:21:52 +03:00
dropper.py Bugfix in dropper.py, handle gracefully failure in cleanup 2018-04-17 14:20:21 +03:00
example.conf Merge pull request #104 from guardicore/bugfix/upgrade-windows-32-to-64 2018-04-17 10:26:30 +03:00
main.py Fix race-condition bug on upgrade 2018-04-11 20:59:23 +03:00
monkey-linux.spec Move range to common code folder 2018-02-26 18:39:49 +02:00
monkey.ico Update icons 2018-02-27 19:39:32 +02:00
monkey.py Merge branch 'develop' into bugfix/upgrade-windows-32-to-64 2018-04-11 19:21:52 +03:00
monkey.spec Move range to common code folder 2018-02-26 18:39:49 +02:00
monkeyfs.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
readme.txt rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
requirements.txt Fix CR 2018-04-11 11:28:59 +03:00
system_singleton.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
tunnel.py rename chaos_monkey folder to infection_monkey 2018-02-19 11:35:34 +02:00
utils.py Rename check for 64-bit to make explict it's a windows only check 2018-04-12 17:57:21 +03:00
windows_upgrader.py Bugfix when upgrading the monkey without admin permissions. 2018-04-17 11:27:35 +03:00

readme.txt

How to build a monkey binary from scratch.

The monkey is composed of three separate parts.
* The Infection Monkey itself - PyInstaller compressed python archives
* Sambacry binaries - Two linux binaries, 32/64 bit.
* Mimikatz binaries - Two windows binaries, 32/64 bit.

--- Windows ---

1. Install python 2.7. Preferably you should use ActiveState Python which includes pywin32 built in. 
    You must use an up to date version, at least version 2.7.10
    https://www.python.org/download/releases/2.7/
2.	Install pywin32 (if you didn't install ActiveState Python)
	Install pywin32, minimum build 219
		http://sourceforge.net/projects/pywin32/files/pywin32
3.	Add python directories to PATH environment variable (if you didn't install ActiveState Python)
	a. Run the following command on a cmd console (Replace C:\Python27 with your python directory if it's different)
		setx /M PATH "%PATH%;C:\Python27;C:\Pytohn27\Scripts
	b. Close the console, make sure you execute all commands in a new cmd console from now on.
4.	Install pip
	a. Download and run the pip installer
	https://bootstrap.pypa.io/get-pip.py
5.	Install further dependencies
	a. install VCForPython27.msi
		https://aka.ms/vcpython27
	b. if not installed, install Microsoft Visual C++ 2010 SP1 Redistributable Package
		32bit: http://www.microsoft.com/en-us/download/details.aspx?id=8328
		64bit: http://www.microsoft.com/en-us/download/details.aspx?id=13523
6.	Download the dependent python packages using 
		pip install -r requirements.txt
7.	Download and extract UPX binary to [source-path]\monkey\infection_monkey\bin\upx.exe:
		https://github.com/upx/upx/releases/download/v3.94/upx394w.zip
8.	Build/Download Sambacry and Mimikatz binaries
	a. Build/Download according to sections at the end of this readme.
	b. Place the binaries under [code location]\infection_monkey\bin
9.	To build the final exe:
		cd [code location]/infection_monkey
		build_windows.bat 
		output is placed under dist\monkey.exe

--- Linux ---

Tested on Ubuntu 16.04 and 17.04.

1.	Install dependencies by running:
		sudo apt-get update
		sudo apt-get install python-pip python-dev libffi-dev upx libssl-dev libc++1
    Install the python packages listed in requirements.txt using pip
        cd [code location]/infection_monkey
		pip install -r requirements.txt
2.	Build Sambacry binaries
	a. Build/Download according to sections at the end of this readme.
	b. Place the binaries under [code location]\infection_monkey\bin
3.	To build, run in terminal:
		cd [code location]/infection_monkey
		chmod +x build_linux.sh
		./build_linux.sh
	output is placed under dist/monkey

-- Sambacry --

Sambacry requires two standalone binaries to execute remotely.
1.	Install gcc-multilib if it's not installed
	sudo apt-get install gcc-multilib
2.	Build the binaries
	cd [code location]/infection_monkey/monkey_utils/sambacry_monkey_runner
	./build.sh

-- Mimikatz --

Mimikatz is required for the Monkey to be able to steal credentials on Windows. It's possible to either compile from sources (requires Visual Studio 2013 and up) or download the binaries from 
https://github.com/guardicore/mimikatz/releases/tag/1.0.0
Download both 32 and 64 bit DLLs and place them under [code location]\infection_monkey\bin