forked from p15670423/monkey
Update and rename README.textile to README.md
This commit is contained in:
parent
68eb19afb1
commit
730f2a58d9
|
@ -0,0 +1,139 @@
|
|||
Infected Chaos Monkey
|
||||
====================
|
||||
|
||||
Datacenter Security Tool
|
||||
------------------------
|
||||
|
||||
### http://www.guardicore.com/the-infected-chaos-monkey/
|
||||
|
||||
The Infected Chaos Monkey is a security tool which tests your Data Center's ability to withstand perimeter breaches and internal server infection. It uses various methods to propagate through a data center, and reports its success to a centralized C&C server.
|
||||
|
||||
Features include:
|
||||
|
||||
* Multiple propagation techniques:
|
||||
* Predefined passwords
|
||||
* Common exploits
|
||||
* Multiple propagation protocols:
|
||||
* SSH
|
||||
* SMB
|
||||
* RDP
|
||||
* A C&C server with a dedicated UI to visualize the Monkey's progress inside the data center
|
||||
|
||||
Getting Started
|
||||
---------------
|
||||
|
||||
The Infected Chaos Monkey is comprised of two parts: the Monkey and the C&C server.
|
||||
The monkey is the tool which infects other machines and propagates to them, while the C&C server collects all Monkey reports and displays them to the user.
|
||||
|
||||
### Requirements
|
||||
|
||||
<Supported OS Versions for monkey>
|
||||
<Supported OS Versions for C&C Server>
|
||||
|
||||
### Installation
|
||||
|
||||
Usage
|
||||
-----
|
||||
|
||||
### Configuring the Monkey
|
||||
|
||||
Monkey configuration is stored in two places:
|
||||
1. By default, the monkey uses a local configuration file (usually, config.bin). This configuration file must include the address of the Monkey's C&C server.
|
||||
2. After successfully connecting to the C&C server, the monkey downloads a new configuration from the server and discards the local configuration. It is possible to change the default configuration from the C&C server's UI.
|
||||
|
||||
Both configuration options use a JSON format for specifying options; see "Options" below for details.
|
||||
|
||||
### Running the C&C Server
|
||||
|
||||
### Unleashing the Monkey
|
||||
|
||||
Download the latest Monkey binary from <> (alternatively, build it by yourself by following the instructions below).
|
||||
The download includes executables for various operating systems, and a default configuration file (config.bin).
|
||||
You can edit the configuration file according the the options detailed below; the default configuration assumes <WHAT?>.
|
||||
|
||||
Once downloaded, run the monkey using ```./monkey-linux-64 m0nk3y -c config.bin```
|
||||
|
||||
Command line options include:
|
||||
* `-c`, `--config`: set configuration file. JSON file with configuration values, will override compiled configuration.
|
||||
* `-p`, `--parent`: set monkey’s parent uuid, allows better recognition of exploited monkeys in c&c
|
||||
* `-t`, `--tunnel`: ip:port, set default tunnel for monkey when connecting to c&c.
|
||||
|
||||
|
||||
Monkey Modus Operandi
|
||||
---------------------
|
||||
|
||||
1. Wakeup connection to c&c, sends basic info of the current machine and the configuration the monkey uses to the c&c.
|
||||
1. First try direct connection to c&c.
|
||||
2. If direct connection fails, try connection through a tunnel, a tunnel is found according to specified parameter (the default tunnel) or by sending a multicast query and waiting for another monkey to answer.
|
||||
3. If no connection can be made to c&c, continue without it.
|
||||
2. If a firewall app is running on the machine (supports Windows Firewall for Win XP and Windows Advanced Firewall for Win 7+), try to add a rule to allow all our traffic.
|
||||
3. Startup of tunnel for other monkeys (if connection to c&c works).
|
||||
1. firewall is checked to allow listening sockets (if we failed to add a rule to windows firewall for example, the tunnel will not be created)
|
||||
2. will answer multicast requests from other monkeys in search of a tunnel.
|
||||
4. Running exploitation sessions, will run x sessions according to configuration:
|
||||
1. Connect to c&c and get the latest configuration
|
||||
2. Scan ip ranges according to configuration.
|
||||
3. Try fingerprinting each host that answer, using the classes defined in the configuration (SMBFinger, SSHFinger, etc)
|
||||
4. Try exploitation on each host found, for each exploit class in configuration:
|
||||
1. check exploit class supports target host (can be disabled by configuration)
|
||||
2. each exploitation class will use the data acquired in fingerprinting, or during the exploit, to find the suitable monkey executable for the host from the c&c.
|
||||
1. If c&c connection fails, and the source monkey’s executable is suitable, we use it.
|
||||
2. If a suitable executable isn’t found, exploitation will fail.
|
||||
3. Executables are cached in memory.
|
||||
5. will skip hosts that are already exploited in next run
|
||||
6. will skip hosts that failed during exploitation in next run (can be disabled by configuration)
|
||||
5. Close tunnel before exiting
|
||||
Wait for monkeys using the tunnel to unregister for it
|
||||
Cleanup
|
||||
Remove firewall rules if added
|
||||
|
||||
Configuration Options
|
||||
---------------------
|
||||
|
||||
Key | Type | Description | Possible Values
|
||||
--- | ---- | ----------- | ---------------
|
||||
singleton_mutex_name | string | string of the mutex name for single instance | example: {2384ec59-0df8-4ab9-918c-843740924a28}
|
||||
alive | bool | sets whether or not the monkey is alive. if false will stop scanning and exploiting.
|
||||
self_delete_in_cleanup | bool | sets whether or not to self delete the monkey executable when stopped.
|
||||
use_file_logging | bool | sets whether or not to use a log file.
|
||||
timeout_between_iterations | int | how long to wait between scan iterations
|
||||
max_iterations | int | how many scan iterations to perform on each run
|
||||
victims_max_find | int | how many victims to look for in a single scan iteration
|
||||
victims_max_exploit | int | how many victims to exploit before stopping
|
||||
command_servers | array | addresses of c&c servers to try to connect | example: ["russian-mail-brides.com:5000"]
|
||||
serialize_config | bool | sets whether or not to save the monkey to disk when finished (will be loaded in next run), saved next to the monkey exe with the name monkey.bin
|
||||
retry_failed_explotation | bool | sets whether or not to retry failed hosts on next scan
|
||||
range_class | class name | sets which ip ranges class is used to construct the list of ips to scan | `FixedRange` - scan list is a static ips list, `RelativeRange` - scan list will be constructed according to ip address of the machine and size of the scan, `ClassCRange` - will scan the entire class c the machine is in.
|
||||
scanner_class | class name | sets which scan class to use when scanning for hosts to exploit | `TCPScanner` - searches for hosts according to open tcp ports, `PingScanner` - searches for hosts according to ping scan
|
||||
finger_classes | tuple of class names | sets which fingerprinting classes to use. | in the list: `SMBFinger` - get host os info by checking smb info, `SSHFinger` - get host os info by checking ssh banner, `PingScanner` - get host os type by checking ping ttl. For example: `(SMBFinger, SSHFinger, PingScanner)`
|
||||
exploiter_classes | tuple of class names | | `SmbExploiter` - exploit using smb connection, `WmiExploiter` - exploit using wmi connection, `RdpExploiter` - exploit using rdp connection, `Ms08_067_Exploiter` - exploit using ms08_067 smb exploit, `SSHExploiter` - exploit using ssh connection
|
||||
range_fixed | tuple of strings | list of ips to scan
|
||||
RelativeRange range_size | int | number of hosts to scan in relative range.
|
||||
TCPScanner tcp_target_ports | list of int | which ports to scan using tcp scan.
|
||||
tcp_scan_timeout | int | timeout for tcp connection in tcp scan (in milliseconds).
|
||||
tcp_scan_interval | int | time to wait between ports in the tcp scan (in milliseconds).
|
||||
tcp_scan_get_banner | bool | sets whether or not to read a banner from the tcp ports when scanning
|
||||
PingScanner ping_scan_timeout | int | timeout for the ping command (in milliseconds).
|
||||
SmbExploiter/WmiExploiter/RdpExploiter psexec_user | string | user to use for connection
|
||||
psexec_passwords | list of strings | list of passwords to use when trying to exploit
|
||||
SmbExploiter skip_exploit_if_file_exist | bool | sets whether or not to abort exploit if the monkey already exists in target.
|
||||
RdpExploiter rdp_use_vbs_download | bool | sets whether to use vbs payload for rdp exploitation. If false, bits payload is used (will fail if bitsadmin.exe doesn’t exist).
|
||||
Ms08_067_Exploiter ms08_067_exploit_attempt | int | number of times to try and exploit using ms08_067 exploit.
|
||||
ms08_067_remote_user_add | string | user to add to target when using ms08_067 exploit
|
||||
ms08_067_remote_user_pass | string | password of the user the exploit will add
|
||||
SSHExploiter ssh_user | string | user to use for ssh connection
|
||||
ssh_passwords | list of strings | list of passwords to use when trying to exploit
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Building the Monkey from source
|
||||
-------------------------------
|
||||
<how to build the monkey>
|
||||
|
||||
|
||||
License
|
||||
=======
|
||||
|
||||
|
|
@ -1,38 +0,0 @@
|
|||
h1. Infected Chaos Monkey
|
||||
|
||||
h2. Datacenter Security Tool
|
||||
|
||||
h3. "http://www.guardicore.com/the-infected-chaos-monkey/":http://www.guardicore.com/the-infected-chaos-monkey/
|
||||
|
||||
The Infected Chaos Monkey is a security tool which tests your Data Center's ability to withstand perimeter breaches and internal server infection.
|
||||
It uses various methods to propagate through a data center, and reports its success to a centralized C&C server.
|
||||
|
||||
Features include:
|
||||
|
||||
* Multiple propagation techniques:
|
||||
** Predefined passwords
|
||||
** Common exploits
|
||||
* Multiple propagation protocols:
|
||||
** SSH
|
||||
** SMB
|
||||
** RDP
|
||||
* A C&C server with a dedicated UI to visualize the Monkey's progress inside the data center
|
||||
|
||||
h2. Getting Started
|
||||
|
||||
h3. Requirements
|
||||
|
||||
h3. Installation
|
||||
|
||||
h2. Usage
|
||||
|
||||
h3. Running the C&C Server
|
||||
|
||||
h3. Unleashing the Monkey
|
||||
|
||||
h2. Options
|
||||
|
||||
|
||||
h1. License
|
||||
|
||||
|
Loading…
Reference in New Issue