-
I'm working on the development of a pen-testing tool and we're planning on integrating ART atomic tests. However, we've run into an issue since after using the python execution framework, the output t…
-
# Spike
- [x] Run Test (0d) @ilija-lazoroski
## Objective
Test the installation of Infection Monkey on Parrot.
## Scope
The below tests are not intended to be exhaustive. Rather, the…
-
The ms08_067 exploiter is only valid for very old systems (Windows Server 2008 and earlier). It causes Infection Monkey to be flagged by Windows Defender. Since this vulnerability is so old, this expl…
-
## Describe the bug
Monkey is not propagating on victim machine on CentOS 7 - @VakarisZ
## To Reproduce
Steps to reproduce the behavior:
1. Set a victim machine
2.Run Monkey Island
3. Con…
-
## Describe the bug
While running the AppImage on CentOS 7, the Island log showed that MongoDB has started successfully and then stuck on waitng for MongoDB server. The mongodb log shows that `li…
-
## Describe the bug
ZeroLogon exploiter is observed to be failing during BB tests. Investigate the logs and debug:
Logs 1
```
+ export PYTHONPATH=/usr/infection_monkey/monkey
+ …
-
## Describe the bug
A clear and concise description of what the bug is.
## To Reproduce
Steps to reproduce the behavior:
1. Exploit a machine using SSH exploiter on AWS
2. Navigate the UI
…
-
## Describe the bug
If a README.txt.monkey file is present in the ransomware target directory the encryption of the files fail with `{'path': 'C:\\w\\Dump\\README.txt', 'success': False, 'error':…
-
#Tasks:
- [ ] Fix the bug (0.25)
## Describe the bug
Documentation of deployment script for Linux describes usage as `./deploy_linux.sh "/home/user/new" "master"`.
When I tried command `.…
-
This is just a placeholder to make sure everyone is aware that `5.0.0` is around the corner: if nobody replies to this issue within a couple days, I will release `5.0.0` from `5.0.x` (after attempting…