forked from p15670423/monkey
Agent: Remove disused config values from WormConfiguration
This commit is contained in:
parent
aac8638df2
commit
98fb4132ec
|
@ -83,9 +83,6 @@ class Configuration(object):
|
||||||
# sets whether or not the monkey is alive. if false will stop scanning and exploiting
|
# sets whether or not the monkey is alive. if false will stop scanning and exploiting
|
||||||
alive = True
|
alive = True
|
||||||
|
|
||||||
finger_classes = []
|
|
||||||
exploiter_classes = []
|
|
||||||
|
|
||||||
# depth of propagation
|
# depth of propagation
|
||||||
depth = 2
|
depth = 2
|
||||||
max_depth = None
|
max_depth = None
|
||||||
|
@ -96,39 +93,6 @@ class Configuration(object):
|
||||||
|
|
||||||
keep_tunnel_open_time = 60
|
keep_tunnel_open_time = 60
|
||||||
|
|
||||||
###########################
|
|
||||||
# scanners config
|
|
||||||
###########################
|
|
||||||
|
|
||||||
# Auto detect and scan local subnets
|
|
||||||
local_network_scan = True
|
|
||||||
|
|
||||||
subnet_scan_list = []
|
|
||||||
inaccessible_subnets = []
|
|
||||||
|
|
||||||
blocked_ips = []
|
|
||||||
|
|
||||||
# TCP Scanner
|
|
||||||
HTTP_PORTS = [
|
|
||||||
80,
|
|
||||||
8080,
|
|
||||||
443,
|
|
||||||
8008, # HTTP alternate
|
|
||||||
7001, # Oracle Weblogic default server port
|
|
||||||
]
|
|
||||||
tcp_target_ports = [22, 2222, 445, 135, 3389, 80, 8080, 443, 8008, 3306, 9200]
|
|
||||||
tcp_target_ports.extend(HTTP_PORTS)
|
|
||||||
tcp_scan_timeout = 3000 # 3000 Milliseconds
|
|
||||||
|
|
||||||
# Ping Scanner
|
|
||||||
ping_scan_timeout = 1000
|
|
||||||
|
|
||||||
###########################
|
|
||||||
# ransomware config
|
|
||||||
###########################
|
|
||||||
|
|
||||||
ransomware = ""
|
|
||||||
|
|
||||||
def get_exploit_user_password_pairs(self):
|
def get_exploit_user_password_pairs(self):
|
||||||
"""
|
"""
|
||||||
Returns all combinations of the configurations users and passwords
|
Returns all combinations of the configurations users and passwords
|
||||||
|
@ -153,11 +117,6 @@ class Configuration(object):
|
||||||
exploit_password_list = ["Password1!", "1234", "password", "12345678"]
|
exploit_password_list = ["Password1!", "1234", "password", "12345678"]
|
||||||
exploit_lm_hash_list = []
|
exploit_lm_hash_list = []
|
||||||
exploit_ntlm_hash_list = []
|
exploit_ntlm_hash_list = []
|
||||||
exploit_ssh_keys = []
|
|
||||||
|
|
||||||
aws_access_key_id = ""
|
|
||||||
aws_secret_access_key = ""
|
|
||||||
aws_session_token = ""
|
|
||||||
|
|
||||||
# smb/wmi exploiter
|
# smb/wmi exploiter
|
||||||
smb_download_timeout = 30 # timeout in seconds
|
smb_download_timeout = 30 # timeout in seconds
|
||||||
|
|
Loading…
Reference in New Issue