-
Notifications
You must be signed in to change notification settings - Fork 807
Zerologon Exploiter #911
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Zerologon Exploiter #911
Conversation
monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py
Outdated
Show resolved
Hide resolved
As draft yeah, but for front end, need to mention CVE and mitigation steps and not just "patch" |
f9f9f59
to
2d42222
Compare
2d42222
to
e0134a8
Compare
Monkey Agent logs
|
63c2309
to
42e3090
Compare
42e3090
to
98b9997
Compare
monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py
Outdated
Show resolved
Hide resolved
monkey/monkey_island/cc/services/telemetry/processing/exploit.py
Outdated
Show resolved
Hide resolved
98b9997
to
2a7890b
Compare
TODO: - impacket license - get pwd for some other users if 'Administrator' doesn't exist (and save all users' creds?) - unit tests
… isn't found and save all other credentials
+ other little CR changes
…rologon exploiter)
4710c75
to
6883e4a
Compare
|
||
|
||
def test_get_dc_details_multiple_netbios_names(host, monkeypatch): | ||
def mock_queryIPForName(*args, **kwargs): |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is technically a stub, not a mock: https://martinfowler.com/bliki/TestDouble.html
def mock_queryIPForName(*args, **kwargs): | ||
return NETBIOS_NAMES | ||
|
||
monkeypatch.setattr(NetBIOS, "queryIPForName", mock_queryIPForName) | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What if we create a function that accepts NETBIOS_NAMES
as a parameter and patches NetBIOS
appropriately? Then this code wont be duplicated in 2 tests.
DeepCode's analysis on #43cac3 found:
Top issues
👉 View analysis in DeepCode’s Dashboard | Configure the bot |
monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py
Outdated
Show resolved
Hide resolved
Co-authored-by: Mike Salvatore <mike.s.salvatore@gmail.com>
Fixes #846
Workflow
Other notes
The current workflow is such that once a machine is exploited, no other exploits are run on it. However, using Zerologon, we're extracting credentials which are useful for other exploits. We need the other exploits to run after this one, even if it's successful. The modifications in
HostExploiter
andmonkey.py
handle that.Stolen credentials are only gathered from system info collectors right now, but this exploiter changes that. There are changes in the telemetry and reporting parts for that.