22
22
# Log4shell (10.2.3.55, 10.2.3.56, 10.2.3.49, 10.2.3.50, 10.2.3.51, 10.2.3.52)
23
23
# MSSQL (10.2.2.16)
24
24
# SMB mimikatz password stealing and brute force (10.2.2.14 and 10.2.2.15)
25
+ # SNMP (10.2.3.20)
25
26
26
27
27
28
def _add_exploiters (agent_configuration : AgentConfiguration ) -> AgentConfiguration :
@@ -35,6 +36,11 @@ def _add_exploiters(agent_configuration: AgentConfiguration) -> AgentConfigurati
35
36
"Log4ShellExploiter" : {},
36
37
"MSSQLExploiter" : {},
37
38
"SMB" : {"agent_binary_upload_timeout" : 30 , "smb_connect_timeout" : 15 },
39
+ "SNMP" : {
40
+ "agent_binary_download_timeout" : 60 ,
41
+ "snmp_request_timeout" : 0.5 ,
42
+ "snmp_retries" : 3 ,
43
+ },
38
44
}
39
45
40
46
return add_exploiters (agent_configuration , exploiters = exploiters )
@@ -59,6 +65,7 @@ def _add_subnets(agent_configuration: AgentConfiguration) -> AgentConfiguration:
59
65
"10.2.2.16" ,
60
66
"10.2.2.14" ,
61
67
"10.2.2.15" ,
68
+ "10.2.3.20" ,
62
69
]
63
70
return add_subnets (agent_configuration , subnets )
64
71
@@ -92,6 +99,7 @@ def _add_http_ports(agent_configuration: AgentConfiguration) -> AgentConfigurati
92
99
93
100
CREDENTIALS = (
94
101
Credentials (identity = Username (username = "m0nk3y" ), secret = None ),
102
+ Credentials (identity = Username (username = "c0mmun1ty" ), secret = None ),
95
103
Credentials (identity = None , secret = Password (password = "Ivrrw5zEzs" )),
96
104
Credentials (identity = None , secret = Password (password = "Xk8VDTsC" )),
97
105
)
0 commit comments