-
Notifications
You must be signed in to change notification settings - Fork 786
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
T1086 powershell #344
T1086 powershell #344
Conversation
…hash # Conflicts: # monkey/monkey_island/cc/services/attack/attack_report.py # monkey/monkey_island/cc/services/attack/technique_reports/T1197.py # monkey/monkey_island/cc/services/attack/technique_reports/__init__.py
# How long should be wait after each request in seconds | ||
REQUEST_DELAY = 0.0001 | ||
# How long should we wait after each request in seconds | ||
REQUEST_DELAY = 0.1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Any good reason to change this? And specifically in this branch?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No. Needed this bugfix to test and forgot to revert. Bugfix will be included in new weblogic exploiter.
monkey/monkey_island/cc/services/attack/technique_reports/T1086.py
Outdated
Show resolved
Hide resolved
…ne_interface # Conflicts: # monkey/monkey_island/cc/services/attack/attack_report.py
# Conflicts: # monkey/monkey_island/cc/services/attack/attack_report.py
# Conflicts: # monkey/infection_monkey/exploit/hadoop.py
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you fixed things before, don't forget to push the changes.
Also adapt add_example_cmd to include the shell type when you add a new command.
To be clear, add_example_cmd doesn't need to receive the type as a parameter (unless it makes it easier/more accurate), you just need to detect the type like you detect powershell right now.
An entry in the cmds array will look something like:
{'cmd': 'dir C:\', 'shell_type': 'cmd'}
or like this {'cmd': 'Get-Service WinDefend', 'shell_type': 'powershell'}
# Conflicts: # monkey/monkey_island/cc/services/attack/technique_reports/T1210.py
…ne_interface # Conflicts: # monkey/monkey_island/cc/services/attack/technique_reports/T1197.py # monkey/monkey_island/cc/services/attack/technique_reports/__init__.py
…hash # Conflicts: # monkey/monkey_island/cc/services/attack/technique_reports/T1197.py # monkey/monkey_island/cc/services/attack/technique_reports/__init__.py
# Conflicts: # monkey/monkey_island/cc/services/attack/technique_reports/__init__.py
# Conflicts: # monkey/infection_monkey/exploit/__init__.py # monkey/infection_monkey/exploit/hadoop.py # monkey/monkey_island/cc/services/attack/attack_report.py
4f881a8
to
7fe100b
Compare
Why do we need the |
7fe100b
to
3e9dcd3
Compare
# Conflicts: # monkey/monkey_island/cc/services/attack/attack_report.py
Feature