8000 Implement an RDP exploiter · Issue #3425 · guardicore/monkey · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
Implement an RDP exploiter #3425
@mssalvatore

Description

@mssalvatore

Description

Implement an exploiter that uses RDP to propagate to Windows hosts.

Related: #3376, #3488

Tasks

  • Add vulnerable 2 machines to terraform/GCP (0d) @ilija-lazoroski
    • Password authentication
    • PTH
    • Test depth
  • options (pydantic) @cakekoa
    • determine what options RDP should have (0d)
    • create a pydantic model for RDP options (0d)
    • create a config schema (0d)
  • Create plugin manifest (0d) @cakekoa
  • Create a Pipfile for dependencies (0d) @cakekoa
  • plugin.py (0d) @cakekoa
  • command builder (0d) @cakekoa
  • exploit client (0d) @ilija-lazoroski
    • Don't forget to add MITRE tags
    • Copy agent binary do Desktop if that avoids administrator privilege dialogues.
  • Domain specification logic (0d)
  • Make RDP64->65 propagation use PTH (0d)
  • Add a jenkins job to build the plugin (0d) @ilija-lazoroski
    • Update the island build jobs on Jenkins to copy the artifacts from the RDP plugin build job @cakekoa
  • Update ETE test configurations (add to depth 2) (0d)
    • Test
    • Fix the RDP machine hostnames in the ansible scripts
    • Investigate Credentials pair issue from UI
  • Document the new exploiter (0d)

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      0