-
Notifications
You must be signed in to change notification settings - Fork 786
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Traceback when running hostname_collector #1374
Comments
When monkey starts, it launches a thread for executing post breach actions. It then executes its propagation loop on the main thread. If the maximum propagation depth has been reached, a The solution is twofold:
|
Fixes #1374 When monkey starts, it launches a thread for executing post breach actions. It then executes its propagation loop on the main thread. If the maximum propagation depth has been reached, a PlannedShutdownException is raised on the main thread. This results in InfectionMonkey.cleanup() being called, which then calls InfectionMonkey.self_delete(). self_delete() deletes the monkey binary, but the post breach actions thread hasn't been stopped, resulting in a trace when the thread attempts an import. We don't need to shutdown if the maximum propagation depth is reached. We only need to skip the propagation phase so that monkey does not propagate further. PBAs and payloads can still be allowed to run.
Fixes #1374 When monkey starts, it launches a thread for executing post breach actions. It then executes its propagation loop on the main thread. If the maximum propagation depth has been reached, a PlannedShutdownException is raised on the main thread. This results in InfectionMonkey.cleanup() being called, which then calls InfectionMonkey.self_delete(). self_delete() deletes the monkey binary, but the post breach actions thread hasn't been stopped, resulting in a trace when the thread attempts an import. We don't need to shutdown if the maximum propagation depth is reached. We only need to skip the propagation phase so that monkey does not propagate further. PBAs and payloads can still be allowed to run.
Fixes #1374 When monkey starts, it launches a thread for executing post breach actions. It then executes its propagation loop on the main thread. If the maximum propagation depth has been reached, a PlannedShutdownException is raised on the main thread. This results in InfectionMonkey.cleanup() being called, which then calls InfectionMonkey.self_delete(). self_delete() deletes the monkey binary, but the post breach actions thread hasn't been stopped, resulting in a trace when the thread attempts an import. We don't need to shutdown if the maximum propagation depth is reached. We only need to skip the propagation phase so that monkey does not propagate further. PBAs and payloads can still be allowed to run.
Fixes #1374 When monkey starts, it launches a thread for executing post breach actions. It then executes its propagation loop on the main thread. If the maximum propagation depth has been reached, a PlannedShutdownException is raised on the main thread. This results in InfectionMonkey.cleanup() being called, which then calls InfectionMonkey.self_delete(). self_delete() deletes the monkey binary, but the post breach actions thread hasn't been stopped, resulting in a trace when the thread attempts an import. We don't need to shutdown if the maximum propagation depth is reached. We only need to skip the propagation phase so that monkey does not propagate further. PBAs and payloads can still be allowed to run.
Describe the bug
After a Linux machine is breached with the SSHExploiter, the monkey agent attempts to run the hostname collector, resulting in a traceback (see screenshot below). This does not seem to happen if the monkey agent is run manually.
To Reproduce
Steps to reproduce the behavior:
/tmp/user-1563
Expected behavior
No errors in the log.
Screenshots
Machine version (please complete the following information):
Tasks
The text was updated successfully, but these errors were encountered: