-
Notifications
You must be signed in to change notification settings - Fork 807
Ransomware encryption table data #1308
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
DeepCode's analysis on #3a2f5f found:
Top issues
👉 View analysis in DeepCode’s Dashboard | Configure the bot👉 The DeepCode service and API will be deprecated in August, 2021. Here is the information how to migrate. Thank you for using DeepCode 🙏 ❤️ !If you are using our plugins, you might be interested in their successors: Snyk's JetBrains plugin and Snyk's VS Code plugin. |
Codecov Report
@@ Coverage Diff @@
## develop #1308 +/- ##
===========================================
+ Coverage 30.93% 31.10% +0.17%
===========================================
Files 455 458 +3
Lines 13558 13594 +36
===========================================
+ Hits 4194 4229 +35
- Misses 9364 9365 +1
Continue to review full report at Codecov.
|
monkey/tests/unit_tests/monkey_island/cc/services/ransomware/test_ransomware_report.py
Outdated
Show resolved
Hide resolved
] | ||
|
||
|
||
@pytest.mark.skip(reason="Can't find a way to use the same mock database client in Monkey model") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This test is unconditionally skipped. It should either be run or removed.
"$group": { | ||
"_id": {"monkey_guid": "$monkey_guid", "files_encrypted": "$data.files.success"} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
…ware report, file encryption table
…f a bug in mongomock
…r fetching exploited nodes Re-using current report infrastructure means that it's more trivial to implement/maintain and is already tested. The downside is performance
…d used. Also, minor refactorings in ransomware_report service and resource
…encrypted and the number of total encryption attempts
f67a500
to
a0e0e0a
Compare
def _get_monkey_origin_exploits(monkey_hostname, exploited_nodes): | ||
origin_exploits = [ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why call this _get_monkey_origin_exploits? It's returning the origin of the monkey on a machine whether it was an exploit or manual execution.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"Monkey origin" is too ambiguous, it could mean "where monkey got downloaded from", for example. "Exploit" indicates that it means which exploit got monkey into the system. "Manual run" is also an exploit in terms of a simulation. If you have a clearer name suggest and let's fix, I couldn't come up with one without being verbose
What does this PR do?
Fixes part of #1240
Add any further explanations here.
PR Checklist
Testing Checklist