forked from p15670423/monkey
Agent: Use path relative to __file__ to locate powershell scripts
This commit is contained in:
parent
536b061cc7
commit
7f71901a29
|
@ -1,7 +1,10 @@
|
||||||
import subprocess
|
import subprocess
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
from infection_monkey.utils.environment import is_windows_os
|
from infection_monkey.utils.environment import is_windows_os
|
||||||
|
|
||||||
|
MODIFY_POWERSHELL_STARTUP_SCRIPT = Path(__file__).parent / "modify_powershell_startup_file.ps1"
|
||||||
|
|
||||||
|
|
||||||
def get_windows_commands_to_modify_shell_startup_files():
|
def get_windows_commands_to_modify_shell_startup_files():
|
||||||
if not is_windows_os():
|
if not is_windows_os():
|
||||||
|
@ -28,7 +31,6 @@ def get_windows_commands_to_modify_shell_startup_files():
|
||||||
|
|
||||||
return [
|
return [
|
||||||
"powershell.exe",
|
"powershell.exe",
|
||||||
"infection_monkey/post_breach/shell_startup_files/windows"
|
str(MODIFY_POWERSHELL_STARTUP_SCRIPT),
|
||||||
"/modify_powershell_startup_file.ps1",
|
|
||||||
"-startup_file_path {0}",
|
"-startup_file_path {0}",
|
||||||
], STARTUP_FILES_PER_USER
|
], STARTUP_FILES_PER_USER
|
||||||
|
|
|
@ -1,5 +1,10 @@
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
TIMESTOMPING_SCRIPT = Path(__file__).parent / "timestomping.ps1"
|
||||||
|
|
||||||
|
|
||||||
def get_windows_timestomping_commands():
|
def get_windows_timestomping_commands():
|
||||||
return "powershell.exe infection_monkey/post_breach/timestomping/windows/timestomping.ps1"
|
return f"powershell.exe {TIMESTOMPING_SCRIPT}"
|
||||||
|
|
||||||
|
|
||||||
# Commands' source: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.006
|
# Commands' source: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.006
|
||||||
|
|
Loading…
Reference in New Issue