forked from p15670423/monkey
Manually fixed long lines not picked up by automatic refactoring
This commit is contained in:
parent
1c44ada9bb
commit
73da6fdc40
|
@ -56,7 +56,8 @@ class TestPypykatzHandler(TestCase):
|
||||||
{
|
{
|
||||||
"credtype": "dpapi",
|
"credtype": "dpapi",
|
||||||
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
||||||
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e"
|
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b7294"
|
||||||
|
"7f5e80920034d1275d8613532025975e"
|
||||||
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
||||||
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
||||||
"luid": 123086,
|
"luid": 123086,
|
||||||
|
@ -64,7 +65,8 @@ class TestPypykatzHandler(TestCase):
|
||||||
{
|
{
|
||||||
"credtype": "dpapi",
|
"credtype": "dpapi",
|
||||||
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
||||||
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e"
|
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b729"
|
||||||
|
"47f5e80920034d1275d8613532025975e"
|
||||||
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
||||||
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
||||||
"luid": 123086,
|
"luid": 123086,
|
||||||
|
@ -72,7 +74,8 @@ class TestPypykatzHandler(TestCase):
|
||||||
{
|
{
|
||||||
"credtype": "dpapi",
|
"credtype": "dpapi",
|
||||||
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
||||||
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e"
|
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72"
|
||||||
|
"947f5e80920034d1275d8613532025975e"
|
||||||
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
||||||
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
||||||
"luid": 123086,
|
"luid": 123086,
|
||||||
|
@ -80,7 +83,8 @@ class TestPypykatzHandler(TestCase):
|
||||||
{
|
{
|
||||||
"credtype": "dpapi",
|
"credtype": "dpapi",
|
||||||
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
"key_guid": "9123-123ae123de4-121239-3123-421f",
|
||||||
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b72947f5e80920034d1275d8613532025975e"
|
"masterkey": "6e81d0cfd5e9ec083cfbdaf4d25b9cc9cc6b729"
|
||||||
|
"47f5e80920034d1275d8613532025975e"
|
||||||
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
"f051e891c30e6e9af6db54500fedfed1c968389bf6262c77fbaa68c9",
|
||||||
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
"sha1_masterkey": "bbdabc3cd2f6bcbe3e2cee6ce4ce4cebcef4c6da",
|
||||||
"luid": 123086,
|
"luid": 123086,
|
||||||
|
|
|
@ -226,7 +226,8 @@ SCHEMA = {
|
||||||
"value": False,
|
"value": False,
|
||||||
"necessary": False,
|
"necessary": False,
|
||||||
"link": "https://attack.mitre.org/techniques/T1216",
|
"link": "https://attack.mitre.org/techniques/T1216",
|
||||||
"description": "Adversaries may use scripts signed with trusted certificates to "
|
"description": "Adversaries may use scripts signed with "
|
||||||
|
"trusted certificates to "
|
||||||
"proxy execution of malicious files on Windows systems.",
|
"proxy execution of malicious files on Windows systems.",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -254,7 +255,8 @@ SCHEMA = {
|
||||||
"value": True,
|
"value": True,
|
||||||
"necessary": False,
|
"necessary": False,
|
||||||
"link": "https://attack.mitre.org/techniques/T1003",
|
"link": "https://attack.mitre.org/techniques/T1003",
|
||||||
"description": "Mapped with T1078 Valid Accounts because both techniques require"
|
"description": "Mapped with T1078 Valid Accounts because "
|
||||||
|
"both techniques require"
|
||||||
" same credential harvesting modules. "
|
" same credential harvesting modules. "
|
||||||
"Credential dumping is the process of obtaining account login "
|
"Credential dumping is the process of obtaining account login "
|
||||||
"and password "
|
"and password "
|
||||||
|
|
|
@ -64,7 +64,8 @@ FINGER_CLASSES = {
|
||||||
"enum": ["PostgreSQLFinger"],
|
"enum": ["PostgreSQLFinger"],
|
||||||
"title": "PostgreSQLFinger",
|
"title": "PostgreSQLFinger",
|
||||||
"safe": True,
|
"safe": True,
|
||||||
"info": "Checks if PostgreSQL service is running and if its communication is encrypted.",
|
"info": "Checks if PostgreSQL service is running and if "
|
||||||
|
"its communication is encrypted.",
|
||||||
"attack_techniques": ["T1210"],
|
"attack_techniques": ["T1210"],
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
|
|
Loading…
Reference in New Issue