{
  "basic": {
    "credentials": {
      "exploit_password_list": [
        "Password1!",
        "12345678",
        "^NgDvY59~8"
      ],
      "exploit_user_list": [
        "Administrator",
        "m0nk3y",
        "user"
      ]
    },
    "general": {
      "should_exploit": true
    }
  },
  "basic_network": {
    "general": {
      "blocked_ips": [],
      "depth": 2,
      "local_network_scan": false,
      "subnet_scan_list": [
        "10.2.2.41",
        "10.2.2.42"
      ]
    },
    "network_analysis": {
      "inaccessible_subnets": []
    }
  },
  "cnc": {
    "servers": {
      "command_servers": [
        "10.2.2.251:5000"
      ],
      "current_server": "10.2.2.251:5000",
      "internet_services": [
        "monkey.guardicore.com",
        "www.google.com"
      ]
    }
  },
  "exploits": {
    "general": {
      "exploiter_classes": [
        "SmbExploiter",
        "WmiExploiter",
        "SSHExploiter",
        "ShellShockExploiter",
        "SambaCryExploiter",
        "ElasticGroovyExploiter",
        "Struts2Exploiter",
        "WebLogicExploiter",
        "HadoopExploiter",
        "VSFTPDExploiter"
      ],
      "skip_exploit_if_file_exist": false
    },
    "ms08_067": {
      "ms08_067_exploit_attempts": 5,
      "remote_user_pass": "Password1!",
      "user_to_add": "Monkey_IUSER_SUPPORT"
    },
    "rdp_grinder": {
      "rdp_use_vbs_download": true
    },
    "sambacry": {
      "sambacry_folder_paths_to_guess": [
        "/",
        "/mnt",
        "/tmp",
        "/storage",
        "/export",
        "/share",
        "/shares",
        "/home"
      ],
      "sambacry_shares_not_to_check": [
        "IPC$",
        "print$"
      ],
      "sambacry_trigger_timeout": 5
    },
    "smb_service": {
      "smb_download_timeout": 300,
      "smb_service_name": "InfectionMonkey"
    }
  },
  "internal": {
    "classes": {
      "finger_classes": [
        "SMBFinger",
        "SSHFinger",
        "PingScanner",
        "HTTPFinger",
        "MySQLFinger",
        "MSSQLFinger",
        "ElasticFinger"
      ]
    },
    "dropper": {
      "dropper_date_reference_path_linux": "/bin/sh",
      "dropper_date_reference_path_windows": "%windir%\\system32\\kernel32.dll",
      "dropper_set_date": true,
      "dropper_target_path_linux": "/tmp/monkey",
      "dropper_target_path_win_32": "C:\\Windows\\temp\\monkey32.exe",
      "dropper_target_path_win_64": "C:\\Windows\\temp\\monkey64.exe",
      "dropper_try_move_first": true
    },
    "exploits": {
      "exploit_lm_hash_list": [],
      "exploit_ntlm_hash_list": [],
      "exploit_ssh_keys": [
        {
          "ip": "10.2.2.41",
          "private_key": "-----BEGIN RSA PRIVATE KEY-----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\ndrIj1d5/r2N1Cxorx0IbVWsW7WPVM/lVyBU7+2QsKoI5YIervsJY\n-----END RSA PRIVATE KEY-----\n",
          "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIfSTUs4gsNNWWLk2Wpy9F2hFzZoyfkjlmEmycE27MHbwPoV0ARuMOf+/508rnwvhYagYykeqTjuY0OB1MiR8/kEGBu5CkFSauwJmfxBVGmpncRIJeycys6OthGpN6Wq4ZZH3Em8gnA3PdRswTZzxJg49ze0ewg3KfxO3aywDwv0qNxN7oLM2lsI1tnpDejv+Kxg/v2iCIVj5Ucreu0FjXtob1sPHm9x7xGgivjre7/5r6Nhc+7NmCd1O07cQ/CrhOLWnJ2m4mj09iHWJjpE/dc8xg3CmgpOhjPIRJ6qrCiWbP6eESH+tC27DBbvTjcgz7rbD1Q+Qda/bymoNnEHGH m0nk3y@sshkeys-11\n",
          "user": "m0nk3y"
        },
        {
          "ip": "10.2.2.42",
          "private_key": "-----BEGIN RSA PRIVATE KEY-----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\nhsp2wHDCuS8cKK9E8RJ3YYNgLh5uH1J+GhzSix1V8sizT0Y1UPOCDQ==\n-----END RSA PRIVATE KEY-----\n",
          "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDl+arAlX81k5OFnQHRJcnuPP7GnbO9Uj4NHXjUmkQkYCbzE/wIyYMAKQZUNl/BBARayYbpYexEmcFObWNrBRuGAPwQZg2n2yPwbihboa9OHPOVm+kAGC1LJa1PoIsGgXu3f/CAVd8BoDfeVOD8e35tcExoBmIfJGV7E+Oa1+G7UfDjhwwG7EnADfU6qc7Q48o6HrBbQ5a1r0GwmcUFyQS97XLYF/ZI6cV2UARX201bAa38ArwwASmDARlchKuo65yOftgYTN9n5iCOrj8zcUYTfW22tOARGoA9yF3UKnp1rqaVi27PHfmylXaTF/bJ1gdg46C9LxwIgiTsYgA1nO2Z m0nk3y@sshkeys-12\n",
          "user": "m0nk3y"
        }
      ]
    },
    "general": {
      "keep_tunnel_open_time": 60,
      "monkey_dir_name": "monkey_dir",
      "singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}"
    },
    "kill_file": {
      "kill_file_path_linux": "/var/run/monkey.not",
      "kill_file_path_windows": "%windir%\\monkey.not"
    },
    "logging": {
      "dropper_log_path_linux": "/tmp/user-1562",
      "dropper_log_path_windows": "%temp%\\~df1562.tmp",
      "monkey_log_path_linux": "/tmp/user-1563",
      "monkey_log_path_windows": "%temp%\\~df1563.tmp",
      "send_log_to_server": true
    }
  },
  "monkey": {
    "behaviour": {
      "PBA_linux_filename": "",
      "PBA_windows_filename": "",
      "custom_PBA_linux_cmd": "",
      "custom_PBA_windows_cmd": "",
      "self_delete_in_cleanup": true,
      "serialize_config": false,
      "use_file_logging": true
    },
    "general": {
      "alive": true,
      "post_breach_actions": []
    },
    "life_cycle": {
      "max_iterations": 1,
      "retry_failed_explotation": true,
      "timeout_between_iterations": 100,
      "victims_max_exploit": 7,
      "victims_max_find": 30
    },
    "system_info": {
      "collect_system_info": true,
      "extract_azure_creds": true,
      "should_use_mimikatz": true
    }
  },
  "network": {
    "ping_scanner": {
      "ping_scan_timeout": 1000
    },
    "tcp_scanner": {
      "HTTP_PORTS": [
        80,
        8080,
        443,
        8008,
        7001
      ],
      "tcp_scan_get_banner": true,
      "tcp_scan_interval": 0,
      "tcp_scan_timeout": 3000,
      "tcp_target_ports": [
        22,
        2222,
        445,
        135,
        3389,
        80,
        8080,
        443,
        8008,
        3306,
        9200,
        7001
      ]
    }
  }
}