forked from p15670423/monkey
Agent: Use path relative to __file__ to locate powershell scripts
This commit is contained in:
parent
536b061cc7
commit
7f71901a29
|
@ -1,7 +1,10 @@
|
|||
import subprocess
|
||||
from pathlib import Path
|
||||
|
||||
from infection_monkey.utils.environment import is_windows_os
|
||||
|
||||
MODIFY_POWERSHELL_STARTUP_SCRIPT = Path(__file__).parent / "modify_powershell_startup_file.ps1"
|
||||
|
||||
|
||||
def get_windows_commands_to_modify_shell_startup_files():
|
||||
if not is_windows_os():
|
||||
|
@ -28,7 +31,6 @@ def get_windows_commands_to_modify_shell_startup_files():
|
|||
|
||||
return [
|
||||
"powershell.exe",
|
||||
"infection_monkey/post_breach/shell_startup_files/windows"
|
||||
"/modify_powershell_startup_file.ps1",
|
||||
str(MODIFY_POWERSHELL_STARTUP_SCRIPT),
|
||||
"-startup_file_path {0}",
|
||||
], STARTUP_FILES_PER_USER
|
||||
|
|
|
@ -1,5 +1,10 @@
|
|||
from pathlib import Path
|
||||
|
||||
TIMESTOMPING_SCRIPT = Path(__file__).parent / "timestomping.ps1"
|
||||
|
||||
|
||||
def get_windows_timestomping_commands():
|
||||
return "powershell.exe infection_monkey/post_breach/timestomping/windows/timestomping.ps1"
|
||||
return f"powershell.exe {TIMESTOMPING_SCRIPT}"
|
||||
|
||||
|
||||
# Commands' source: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.006
|
||||
|
|
Loading…
Reference in New Issue