diff --git a/monkey/infection_monkey/system_info/windows_cred_collector/test_pypykatz_handler.py b/monkey/infection_monkey/system_info/windows_cred_collector/test_pypykatz_handler.py index f2d9565b1..de27cbf59 100644 --- a/monkey/infection_monkey/system_info/windows_cred_collector/test_pypykatz_handler.py +++ b/monkey/infection_monkey/system_info/windows_cred_collector/test_pypykatz_handler.py @@ -56,7 +56,8 @@ class TestPypykatzHandler(TestCase): { "credtype": "dpapi", "key_guid": "9123-123ae123de4-121239-3123-421f", - "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e" + "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b7294" + "7f5e80920034d1275d8613532025975e" "f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9", "sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da", "luid": 123086, @@ -64,7 +65,8 @@ class TestPypykatzHandler(TestCase): { "credtype": "dpapi", "key_guid": "9123-123ae123de4-121239-3123-421f", - "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e" + "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b729" + "47f5e80920034d1275d8613532025975e" "f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9", "sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da", "luid": 123086, @@ -72,7 +74,8 @@ class TestPypykatzHandler(TestCase): { "credtype": "dpapi", "key_guid": "9123-123ae123de4-121239-3123-421f", - "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e" + "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72" + "947f5e80920034d1275d8613532025975e" "f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9", "sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da", "luid": 123086, @@ -80,7 +83,8 @@ class TestPypykatzHandler(TestCase): { "credtype": "dpapi", "key_guid": "9123-123ae123de4-121239-3123-421f", - "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e" + "masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b729" + "47f5e80920034d1275d8613532025975e" "f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9", "sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da", "luid": 123086, diff --git a/monkey/monkey_island/cc/services/attack/attack_schema.py b/monkey/monkey_island/cc/services/attack/attack_schema.py index e15e1fc86..7f277265a 100644 --- a/monkey/monkey_island/cc/services/attack/attack_schema.py +++ b/monkey/monkey_island/cc/services/attack/attack_schema.py @@ -226,7 +226,8 @@ SCHEMA = { "value": False, "necessary": False, "link": "https://attack.mitre.org/techniques/T1216", - "description": "Adversaries may use scripts signed with trusted certificates to " + "description": "Adversaries may use scripts signed with " + "trusted certificates to " "proxy execution of malicious files on Windows systems.", }, }, @@ -254,7 +255,8 @@ SCHEMA = { "value": True, "necessary": False, "link": "https://attack.mitre.org/techniques/T1003", - "description": "Mapped with T1078 Valid Accounts because both techniques require" + "description": "Mapped with T1078 Valid Accounts because " + "both techniques require" " same credential harvesting modules. " "Credential dumping is the process of obtaining account login " "and password " diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py index b95f9f257..2cf94b4e1 100644 --- a/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py +++ b/monkey/monkey_island/cc/services/config_schema/definitions/finger_classes.py @@ -64,7 +64,8 @@ FINGER_CLASSES = { "enum": ["PostgreSQLFinger"], "title": "PostgreSQLFinger", "safe": True, - "info": "Checks if PostgreSQL service is running and if its communication is encrypted.", + "info": "Checks if PostgreSQL service is running and if " + "its communication is encrypted.", "attack_techniques": ["T1210"], }, ],