-
Notifications
You must be signed in to change notification settings - Fork 807
Closed
Description
Description
The separation between brute force and vulnerability exploiters was based on the use case of "vulnerability scanning", which is no longer Infection Monkey's main goal. Ultimately, users should be able to configure the order that exploiters run in. While the UI doesn't allow this at the moment, the configuration can be manipulated manually to achieve this. However, vulnerability exploiters always run before brute force exploiters. In other words, this separation reduces the configurability of the system.
Note
To avoid breaking develop
, base all work off of 2787-merge-vulnerability-and-brute-force-exploiter-config.
Tasks
- Modify the
AgentConfiguration
object to contain only "Exploiters` (0d) @mssalvatore- Pydantic object
- Unit tests
- Default configuration
- Modify the UI to comply with the new configuration (0d) @ilija-lazoroski
- UI Schema
- SafeOptionValidator
- Modify the logic in
infection_monkey.master.exploiter
to use the new configuration (0d) @mssalvatore - Modify the logic in
monkey_island.cc.services.reporting.report
to use the new configuration (0d) @ilija-lazoroski - Modify the
path_in_schema
in theAgentConfigurationSchemaService
(0d) @ilija-lazoroski - Fix BB tests (0d)