Merge pull request #88 from guardicore/bugfix/rename_Cnc_island

Remove C&C from all textual and code mentions
This commit is contained in:
itaymmguardicore 2018-02-22 12:37:00 +02:00 committed by GitHub
commit f095639ad2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
11 changed files with 14 additions and 14 deletions

View File

@ -6,13 +6,13 @@ Infection Monkey
Welcome to the Infection Monkey!
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Command and Control(C&C) server.
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
![Infection Monkey map](.github/map-full.png)
The Infection Monkey is comprised of two parts:
* Monkey - A tool which infects other machines and propagates to them
* Monkey Island - A C&C server with a dedicated UI to visualize the Infection Monkey's progress inside the data center
* Monkey Island - A dedicated server to control and visualize the Infection Monkey's progress inside the data center
To read more about the Monkey, visit http://infectionmonkey.com
@ -24,7 +24,7 @@ The Infection Monkey uses the following techniques and exploits to propagate to
* Multiple propagation techniques:
* Predefined passwords
* Common logical exploits
* Password stealing using mimikatz
* Password stealing using Mimikatz
* Multiple exploit methods:
* SSH
* SMB

View File

@ -25,7 +25,7 @@ class ControlClient(object):
@staticmethod
def wakeup(parent=None, default_tunnel=None, has_internet_access=None):
LOG.debug("Trying to wake up with C&C servers list: %r" % WormConfiguration.command_servers)
LOG.debug("Trying to wake up with Monkey Island servers list: %r" % WormConfiguration.command_servers)
if parent or default_tunnel:
LOG.debug("parent: %s, default_tunnel: %s" % (parent, default_tunnel))
hostname = gethostname()

View File

@ -33,6 +33,6 @@ if __name__ == '__main__':
ssl_options={'certfile': os.environ.get('SERVER_CRT', 'server.crt'),
'keyfile': os.environ.get('SERVER_KEY', 'server.key')})
http_server.listen(ISLAND_PORT)
print('Monkey Island C&C Server is running on https://{}:{}'.format(local_ip_addresses()[0], ISLAND_PORT))
print('Monkey Island Server is running on https://{}:{}'.format(local_ip_addresses()[0], ISLAND_PORT))
IOLoop.instance().start()

View File

@ -528,7 +528,7 @@ SCHEMA = {
}
},
"cnc": {
"title": "C&C",
"title": "Monkey Island",
"type": "object",
"properties": {
"servers": {

View File

@ -77,7 +77,7 @@ class AppComponent extends React.Component {
<li>
<NavLink to="/" exact={true}>
<span className="number">1.</span>
Run C&C Server
Run Monkey Island Server
{ this.state.completedSteps.run_server ?
<Icon name="check" className="pull-right checkmark text-success"/>
: ''}

View File

@ -610,7 +610,7 @@ class ReportPageComponent extends React.Component {
The network can probably be segmented. A monkey instance on <span
className="label label-primary">{issue.machine}</span> in the
networks {this.generateInfoBadges(issue.networks)}
could directly access the Monkey Island C&C server in the
could directly access the Monkey Island server in the
networks {this.generateInfoBadges(issue.server_networks)}.
</CollapsibleWellComponent>
</li>

View File

@ -146,7 +146,7 @@ class RunMonkeyPageComponent extends React.Component {
className="btn btn-default btn-lg center-block"
disabled={this.state.runningOnIslandState !== 'not_running'}
>
Run on C&C Server
Run on Monkey Island Server
{ this.renderIconByState(this.state.runningOnIslandState) }
</button>
{

View File

@ -10,14 +10,14 @@ class RunServerPageComponent extends React.Component {
render() {
return (
<Col xs={12} lg={8}>
<h1 className="page-title">1. Monkey Island C&C Server</h1>
<h1 className="page-title">1. Monkey Island Server</h1>
<div style={{'fontSize': '1.2em'}}>
<p style={{'marginTop': '30px'}}>Congrats! You have successfully set up the Monkey Island server. &#x1F44F; &#x1F44F;</p>
<p>
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter
breaches and internal server infections.
The Monkey uses various methods to propagate across a data
center and reports to this Command and Control (C&C) server.
center and reports to this Monkey Island Command and Control server.
</p>
<p>
To read more about the Monkey, visit <a href="http://infectionmonkey.com" target="_blank">infectionmonkey.com</a>

View File

@ -2,7 +2,7 @@
<html>
<head>
<meta charset="utf-8">
<title>Infection Monkey C&C</title>
<title>Infection Monkey Island Server</title>
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<meta name="description" content="">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">

View File

@ -4,5 +4,5 @@ Maintainer: Guardicore
Homepage: http://www.guardicore.com
Priority: optional
Version: 1.0
Description: Guardicore Infection Monkey Island (C&C) installation package
Description: Guardicore Infection Monkey Island installation package
Depends: openssl, python-pip

View File

@ -1,4 +1,4 @@
How to set C&C server:
How to set up the Monkey Island server:
---------------- On Windows ----------------:
1. Create folder "bin" under monkey_island