forked from p15670423/monkey
UT: Fix erroneously abbreviated fixture
This commit is contained in:
parent
81d3300ec7
commit
bff92ed7ad
|
@ -39,25 +39,15 @@ def callback():
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
def exploiter_config(default_agent_config):
|
def exploiter_config(default_agent_configuration):
|
||||||
brute_force = [
|
brute_force = [
|
||||||
ExploiterConfiguration(
|
ExploiterConfiguration(name="MSSQLExploiter", options={"timeout": 10}),
|
||||||
name="MSSQLExploiter", options={"timeout": 10}
|
ExploiterConfiguration(name="SSHExploiter", options={}),
|
||||||
),
|
ExploiterConfiguration(name="WmiExploiter", options={"timeout": 10}),
|
||||||
ExploiterConfiguration(
|
|
||||||
name="SSHExploiter", options={}
|
|
||||||
),
|
|
||||||
ExploiterConfiguration(
|
|
||||||
name="WmiExploiter", options={"timeout": 10}
|
|
||||||
),
|
|
||||||
]
|
|
||||||
vulnerability = [
|
|
||||||
ExploiterConfiguration(
|
|
||||||
name="ZerologonExploiter", options={}
|
|
||||||
)
|
|
||||||
]
|
]
|
||||||
|
vulnerability = [ExploiterConfiguration(name="ZerologonExploiter", options={})]
|
||||||
return ExploitationConfiguration(
|
return ExploitationConfiguration(
|
||||||
options=default_agent_config.propagation.exploitation.options,
|
options=default_agent_configuration.propagation.exploitation.options,
|
||||||
brute_force=brute_force,
|
brute_force=brute_force,
|
||||||
vulnerability=vulnerability,
|
vulnerability=vulnerability,
|
||||||
)
|
)
|
||||||
|
|
|
@ -20,7 +20,7 @@ LINUX_OS = "linux"
|
||||||
|
|
||||||
|
|
||||||
@pytest.fixture
|
@pytest.fixture
|
||||||
def scan_config(default_agent_config):
|
def scan_config(default_agent_configuration):
|
||||||
tcp_config = TCPScanConfiguration(
|
tcp_config = TCPScanConfiguration(
|
||||||
timeout=3,
|
timeout=3,
|
||||||
ports=[
|
ports=[
|
||||||
|
@ -42,7 +42,7 @@ def scan_config(default_agent_config):
|
||||||
tcp_config,
|
tcp_config,
|
||||||
icmp_config,
|
icmp_config,
|
||||||
fingerprinter_config,
|
fingerprinter_config,
|
||||||
default_agent_config.propagation.network_scan.targets,
|
default_agent_configuration.propagation.network_scan.targets,
|
||||||
)
|
)
|
||||||
return scan_config
|
return scan_config
|
||||||
|
|
||||||
|
|
|
@ -140,23 +140,23 @@ class StubExploiter:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
def get_propagation_config(default_agent_config, scan_target_config: ScanTargetConfiguration):
|
def get_propagation_config(default_agent_configuration, scan_target_config: ScanTargetConfiguration):
|
||||||
network_scan = NetworkScanConfiguration(
|
network_scan = NetworkScanConfiguration(
|
||||||
default_agent_config.propagation.network_scan.tcp,
|
default_agent_configuration.propagation.network_scan.tcp,
|
||||||
default_agent_config.propagation.network_scan.icmp,
|
default_agent_configuration.propagation.network_scan.icmp,
|
||||||
default_agent_config.propagation.network_scan.fingerprinters,
|
default_agent_configuration.propagation.network_scan.fingerprinters,
|
||||||
scan_target_config,
|
scan_target_config,
|
||||||
)
|
)
|
||||||
propagation_config = PropagationConfiguration(
|
propagation_config = PropagationConfiguration(
|
||||||
default_agent_config.propagation.maximum_depth,
|
default_agent_configuration.propagation.maximum_depth,
|
||||||
network_scan,
|
network_scan,
|
||||||
default_agent_config.propagation.exploitation,
|
default_agent_configuration.propagation.exploitation,
|
||||||
)
|
)
|
||||||
return propagation_config
|
return propagation_config
|
||||||
|
|
||||||
|
|
||||||
def test_scan_result_processing(
|
def test_scan_result_processing(
|
||||||
telemetry_messenger_spy, mock_ip_scanner, mock_victim_host_factory, default_agent_config
|
telemetry_messenger_spy, mock_ip_scanner, mock_victim_host_factory, default_agent_configuration
|
||||||
):
|
):
|
||||||
p = Propagator(
|
p = Propagator(
|
||||||
telemetry_messenger_spy, mock_ip_scanner, StubExploiter(), mock_victim_host_factory, []
|
telemetry_messenger_spy, mock_ip_scanner, StubExploiter(), mock_victim_host_factory, []
|
||||||
|
@ -167,7 +167,7 @@ def test_scan_result_processing(
|
||||||
local_network_scan=False,
|
local_network_scan=False,
|
||||||
subnets=["10.0.0.1", "10.0.0.2", "10.0.0.3"],
|
subnets=["10.0.0.1", "10.0.0.2", "10.0.0.3"],
|
||||||
)
|
)
|
||||||
propagation_config = get_propagation_config(default_agent_config, targets)
|
propagation_config = get_propagation_config(default_agent_configuration, targets)
|
||||||
p.propagate(propagation_config, 1, Event())
|
p.propagate(propagation_config, 1, Event())
|
||||||
|
|
||||||
assert len(telemetry_messenger_spy.telemetries) == 3
|
assert len(telemetry_messenger_spy.telemetries) == 3
|
||||||
|
@ -253,7 +253,7 @@ class MockExploiter:
|
||||||
|
|
||||||
|
|
||||||
def test_exploiter_result_processing(
|
def test_exploiter_result_processing(
|
||||||
telemetry_messenger_spy, mock_ip_scanner, mock_victim_host_factory, default_agent_config
|
telemetry_messenger_spy, mock_ip_scanner, mock_victim_host_factory, default_agent_configuration
|
||||||
):
|
):
|
||||||
p = Propagator(
|
p = Propagator(
|
||||||
telemetry_messenger_spy, mock_ip_scanner, MockExploiter(), mock_victim_host_factory, []
|
telemetry_messenger_spy, mock_ip_scanner, MockExploiter(), mock_victim_host_factory, []
|
||||||
|
@ -265,7 +265,7 @@ def test_exploiter_result_processing(
|
||||||
local_network_scan=False,
|
local_network_scan=False,
|
||||||
subnets=["10.0.0.1", "10.0.0.2", "10.0.0.3"],
|
subnets=["10.0.0.1", "10.0.0.2", "10.0.0.3"],
|
||||||
)
|
)
|
||||||
propagation_config = get_propagation_config(default_agent_config, targets)
|
propagation_config = get_propagation_config(default_agent_configuration, targets)
|
||||||
p.propagate(propagation_config, 1, Event())
|
p.propagate(propagation_config, 1, Event())
|
||||||
|
|
||||||
exploit_telems = [t for t in telemetry_messenger_spy.telemetries if isinstance(t, ExploitTelem)]
|
exploit_telems = [t for t in telemetry_messenger_spy.telemetries if isinstance(t, ExploitTelem)]
|
||||||
|
@ -290,7 +290,7 @@ def test_exploiter_result_processing(
|
||||||
|
|
||||||
|
|
||||||
def test_scan_target_generation(
|
def test_scan_target_generation(
|
||||||
telemetry_messenger_spy, mock_ip_scanner, mock_victim_host_factory, default_agent_config
|
telemetry_messenger_spy, mock_ip_scanner, mock_victim_host_factory, default_agent_configuration
|
||||||
):
|
):
|
||||||
local_network_interfaces = [NetworkInterface("10.0.0.9", "/29")]
|
local_network_interfaces = [NetworkInterface("10.0.0.9", "/29")]
|
||||||
p = Propagator(
|
p = Propagator(
|
||||||
|
@ -306,7 +306,7 @@ def test_scan_target_generation(
|
||||||
local_network_scan=True,
|
local_network_scan=True,
|
||||||
subnets=["10.0.0.0/29", "172.10.20.30"],
|
subnets=["10.0.0.0/29", "172.10.20.30"],
|
||||||
)
|
)
|
||||||
propagation_config = get_propagation_config(default_agent_config, targets)
|
propagation_config = get_propagation_config(default_agent_configuration, targets)
|
||||||
p.propagate(propagation_config, 1, Event())
|
p.propagate(propagation_config, 1, Event())
|
||||||
|
|
||||||
expected_ip_scan_list = [
|
expected_ip_scan_list = [
|
||||||
|
|
Loading…
Reference in New Issue