forked from p15670423/monkey
Merge pull request #88 from guardicore/bugfix/rename_Cnc_island
Remove C&C from all textual and code mentions
This commit is contained in:
commit
f095639ad2
|
@ -6,13 +6,13 @@ Infection Monkey
|
||||||
|
|
||||||
Welcome to the Infection Monkey!
|
Welcome to the Infection Monkey!
|
||||||
|
|
||||||
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Command and Control(C&C) server.
|
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
|
||||||
|
|
||||||
![Infection Monkey map](.github/map-full.png)
|
![Infection Monkey map](.github/map-full.png)
|
||||||
|
|
||||||
The Infection Monkey is comprised of two parts:
|
The Infection Monkey is comprised of two parts:
|
||||||
* Monkey - A tool which infects other machines and propagates to them
|
* Monkey - A tool which infects other machines and propagates to them
|
||||||
* Monkey Island - A C&C server with a dedicated UI to visualize the Infection Monkey's progress inside the data center
|
* Monkey Island - A dedicated server to control and visualize the Infection Monkey's progress inside the data center
|
||||||
|
|
||||||
To read more about the Monkey, visit http://infectionmonkey.com
|
To read more about the Monkey, visit http://infectionmonkey.com
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ The Infection Monkey uses the following techniques and exploits to propagate to
|
||||||
* Multiple propagation techniques:
|
* Multiple propagation techniques:
|
||||||
* Predefined passwords
|
* Predefined passwords
|
||||||
* Common logical exploits
|
* Common logical exploits
|
||||||
* Password stealing using mimikatz
|
* Password stealing using Mimikatz
|
||||||
* Multiple exploit methods:
|
* Multiple exploit methods:
|
||||||
* SSH
|
* SSH
|
||||||
* SMB
|
* SMB
|
||||||
|
|
|
@ -25,7 +25,7 @@ class ControlClient(object):
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def wakeup(parent=None, default_tunnel=None, has_internet_access=None):
|
def wakeup(parent=None, default_tunnel=None, has_internet_access=None):
|
||||||
LOG.debug("Trying to wake up with C&C servers list: %r" % WormConfiguration.command_servers)
|
LOG.debug("Trying to wake up with Monkey Island servers list: %r" % WormConfiguration.command_servers)
|
||||||
if parent or default_tunnel:
|
if parent or default_tunnel:
|
||||||
LOG.debug("parent: %s, default_tunnel: %s" % (parent, default_tunnel))
|
LOG.debug("parent: %s, default_tunnel: %s" % (parent, default_tunnel))
|
||||||
hostname = gethostname()
|
hostname = gethostname()
|
||||||
|
|
|
@ -33,6 +33,6 @@ if __name__ == '__main__':
|
||||||
ssl_options={'certfile': os.environ.get('SERVER_CRT', 'server.crt'),
|
ssl_options={'certfile': os.environ.get('SERVER_CRT', 'server.crt'),
|
||||||
'keyfile': os.environ.get('SERVER_KEY', 'server.key')})
|
'keyfile': os.environ.get('SERVER_KEY', 'server.key')})
|
||||||
http_server.listen(ISLAND_PORT)
|
http_server.listen(ISLAND_PORT)
|
||||||
print('Monkey Island C&C Server is running on https://{}:{}'.format(local_ip_addresses()[0], ISLAND_PORT))
|
print('Monkey Island Server is running on https://{}:{}'.format(local_ip_addresses()[0], ISLAND_PORT))
|
||||||
IOLoop.instance().start()
|
IOLoop.instance().start()
|
||||||
|
|
||||||
|
|
|
@ -528,7 +528,7 @@ SCHEMA = {
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"cnc": {
|
"cnc": {
|
||||||
"title": "C&C",
|
"title": "Monkey Island",
|
||||||
"type": "object",
|
"type": "object",
|
||||||
"properties": {
|
"properties": {
|
||||||
"servers": {
|
"servers": {
|
||||||
|
|
|
@ -77,7 +77,7 @@ class AppComponent extends React.Component {
|
||||||
<li>
|
<li>
|
||||||
<NavLink to="/" exact={true}>
|
<NavLink to="/" exact={true}>
|
||||||
<span className="number">1.</span>
|
<span className="number">1.</span>
|
||||||
Run C&C Server
|
Run Monkey Island Server
|
||||||
{ this.state.completedSteps.run_server ?
|
{ this.state.completedSteps.run_server ?
|
||||||
<Icon name="check" className="pull-right checkmark text-success"/>
|
<Icon name="check" className="pull-right checkmark text-success"/>
|
||||||
: ''}
|
: ''}
|
||||||
|
|
|
@ -610,7 +610,7 @@ class ReportPageComponent extends React.Component {
|
||||||
The network can probably be segmented. A monkey instance on <span
|
The network can probably be segmented. A monkey instance on <span
|
||||||
className="label label-primary">{issue.machine}</span> in the
|
className="label label-primary">{issue.machine}</span> in the
|
||||||
networks {this.generateInfoBadges(issue.networks)}
|
networks {this.generateInfoBadges(issue.networks)}
|
||||||
could directly access the Monkey Island C&C server in the
|
could directly access the Monkey Island server in the
|
||||||
networks {this.generateInfoBadges(issue.server_networks)}.
|
networks {this.generateInfoBadges(issue.server_networks)}.
|
||||||
</CollapsibleWellComponent>
|
</CollapsibleWellComponent>
|
||||||
</li>
|
</li>
|
||||||
|
|
|
@ -146,7 +146,7 @@ class RunMonkeyPageComponent extends React.Component {
|
||||||
className="btn btn-default btn-lg center-block"
|
className="btn btn-default btn-lg center-block"
|
||||||
disabled={this.state.runningOnIslandState !== 'not_running'}
|
disabled={this.state.runningOnIslandState !== 'not_running'}
|
||||||
>
|
>
|
||||||
Run on C&C Server
|
Run on Monkey Island Server
|
||||||
{ this.renderIconByState(this.state.runningOnIslandState) }
|
{ this.renderIconByState(this.state.runningOnIslandState) }
|
||||||
</button>
|
</button>
|
||||||
{
|
{
|
||||||
|
|
|
@ -10,14 +10,14 @@ class RunServerPageComponent extends React.Component {
|
||||||
render() {
|
render() {
|
||||||
return (
|
return (
|
||||||
<Col xs={12} lg={8}>
|
<Col xs={12} lg={8}>
|
||||||
<h1 className="page-title">1. Monkey Island C&C Server</h1>
|
<h1 className="page-title">1. Monkey Island Server</h1>
|
||||||
<div style={{'fontSize': '1.2em'}}>
|
<div style={{'fontSize': '1.2em'}}>
|
||||||
<p style={{'marginTop': '30px'}}>Congrats! You have successfully set up the Monkey Island server. 👏 👏</p>
|
<p style={{'marginTop': '30px'}}>Congrats! You have successfully set up the Monkey Island server. 👏 👏</p>
|
||||||
<p>
|
<p>
|
||||||
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter
|
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter
|
||||||
breaches and internal server infections.
|
breaches and internal server infections.
|
||||||
The Monkey uses various methods to propagate across a data
|
The Monkey uses various methods to propagate across a data
|
||||||
center and reports to this Command and Control (C&C) server.
|
center and reports to this Monkey Island Command and Control server.
|
||||||
</p>
|
</p>
|
||||||
<p>
|
<p>
|
||||||
To read more about the Monkey, visit <a href="http://infectionmonkey.com" target="_blank">infectionmonkey.com</a>
|
To read more about the Monkey, visit <a href="http://infectionmonkey.com" target="_blank">infectionmonkey.com</a>
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
<html>
|
<html>
|
||||||
<head>
|
<head>
|
||||||
<meta charset="utf-8">
|
<meta charset="utf-8">
|
||||||
<title>Infection Monkey C&C</title>
|
<title>Infection Monkey Island Server</title>
|
||||||
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
|
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
|
||||||
<meta name="description" content="">
|
<meta name="description" content="">
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">
|
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">
|
||||||
|
|
|
@ -4,5 +4,5 @@ Maintainer: Guardicore
|
||||||
Homepage: http://www.guardicore.com
|
Homepage: http://www.guardicore.com
|
||||||
Priority: optional
|
Priority: optional
|
||||||
Version: 1.0
|
Version: 1.0
|
||||||
Description: Guardicore Infection Monkey Island (C&C) installation package
|
Description: Guardicore Infection Monkey Island installation package
|
||||||
Depends: openssl, python-pip
|
Depends: openssl, python-pip
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
How to set C&C server:
|
How to set up the Monkey Island server:
|
||||||
|
|
||||||
---------------- On Windows ----------------:
|
---------------- On Windows ----------------:
|
||||||
1. Create folder "bin" under monkey_island
|
1. Create folder "bin" under monkey_island
|
||||||
|
|
Loading…
Reference in New Issue