forked from p15670423/monkey
69 lines
1.4 KiB
Plaintext
69 lines
1.4 KiB
Plaintext
{
|
|
"command_servers": [
|
|
"192.0.2.0:5000"
|
|
],
|
|
"keep_tunnel_open_time": 60,
|
|
"subnet_scan_list": [
|
|
|
|
],
|
|
"inaccessible_subnets": [],
|
|
"blocked_ips": [],
|
|
"current_server": "192.0.2.0:5000",
|
|
"should_stop": false,
|
|
"collect_system_info": true,
|
|
"should_use_mimikatz": true,
|
|
"depth": 2,
|
|
|
|
"dropper_date_reference_path_windows": "%windir%\\system32\\kernel32.dll",
|
|
"dropper_date_reference_path_linux": "/bin/sh",
|
|
"dropper_set_date": true,
|
|
"dropper_target_path_win_64": "C:\\Windows\\temp\\monkey64.exe",
|
|
"dropper_target_path_linux": "/tmp/monkey",
|
|
|
|
"exploiter_classes": [
|
|
"SSHExploiter",
|
|
"SmbExploiter",
|
|
"WmiExploiter",
|
|
"Struts2Exploiter",
|
|
"WebLogicExploiter",
|
|
"HadoopExploiter",
|
|
"MSSQLExploiter"
|
|
],
|
|
"finger_classes": [
|
|
"SSHFinger",
|
|
"HTTPFinger",
|
|
"SMBFinger",
|
|
"MSSQLFingerprint",
|
|
"ElasticFinger"
|
|
],
|
|
"ping_scan_timeout": 10000,
|
|
"smb_download_timeout": 300,
|
|
"self_delete_in_cleanup": true,
|
|
"exploit_user_list": [],
|
|
"exploit_password_list": [],
|
|
"exploit_lm_hash_list": [],
|
|
"exploit_ntlm_hash_list": [],
|
|
"exploit_ssh_keys": [],
|
|
"local_network_scan": false,
|
|
"tcp_scan_timeout": 10000,
|
|
"tcp_target_ports": [
|
|
22,
|
|
445,
|
|
135,
|
|
3389,
|
|
80,
|
|
8080,
|
|
443,
|
|
3306,
|
|
8008,
|
|
9200,
|
|
7001,
|
|
8088
|
|
],
|
|
"post_breach_actions": []
|
|
custom_PBA_linux_cmd = ""
|
|
custom_PBA_windows_cmd = ""
|
|
PBA_linux_filename = None
|
|
PBA_windows_filename = None
|
|
}
|