mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-21 11:18:06 +00:00
updated basic_narrative and team_project scenarios
This commit is contained in:
@@ -15,9 +15,14 @@
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<system>
|
||||
<system_name>system</system_name>
|
||||
<system_name>target</system_name>
|
||||
<base distro="Debian 7.8" platform="linux" type="server"/>
|
||||
|
||||
<input into_datastore="IP_addresses">
|
||||
<value>172.10.0.2</value>
|
||||
<value>172.10.0.3</value>
|
||||
</input>
|
||||
|
||||
<input into_datastore="accounts">
|
||||
<!-- [0]: Entry account -->
|
||||
<generator type="account">
|
||||
@@ -434,7 +439,12 @@
|
||||
|
||||
<utility module_path=".*sqlmap.*"/>
|
||||
|
||||
<network module_path=".*private_network_1"/>
|
||||
<network type="private_network">
|
||||
<input into="IP_address">
|
||||
<datastore access="next">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
|
||||
<build type="cleanup">
|
||||
<input into="root_password">
|
||||
<generator type="strong_password_generator"/>
|
||||
@@ -442,4 +452,14 @@
|
||||
</build>
|
||||
</system>
|
||||
|
||||
<system>
|
||||
<system_name>attack_vm</system_name>
|
||||
<base distro="Kali" name="MSF"/>
|
||||
<network type="private_network">
|
||||
<input into="IP_address">
|
||||
<datastore access="next">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
</system>
|
||||
|
||||
</scenario>
|
||||
|
||||
@@ -14,17 +14,19 @@
|
||||
<type>blind-audit</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<!-- TODO: update the oVirt plugin to work with multiple NICs and re-introduce pivoting -->
|
||||
|
||||
<!-- Web Server on NIC1 and NIC2 -->
|
||||
<system>
|
||||
<system_name>web_server</system_name>
|
||||
<base platform="linux" distro="Debian 9" type="server"/>
|
||||
<system_name>web</system_name>
|
||||
<base platform="linux" distro="Debian 7.8" type="server"/>
|
||||
|
||||
<input into_datastore="IP_addresses">
|
||||
<value>172.10.0.1</value>
|
||||
<value>172.10.0.2</value>
|
||||
<value>172.10.0.3</value>
|
||||
<value>172.10.0.4</value>
|
||||
<value>172.10.0.5</value>
|
||||
<value>172.10.0.6</value>
|
||||
</input>
|
||||
|
||||
<service module_path="services/unix/http/parameterised_website">
|
||||
@@ -40,26 +42,21 @@
|
||||
</input>
|
||||
</service>
|
||||
|
||||
<vulnerability privilege="user_rwx" access="remote" type="^((?!webapp).)*$">
|
||||
<input into="business_domain">
|
||||
<datastore access_json="['domain']">organisation</datastore>
|
||||
<vulnerability module_path="" privilege="user_rwx" access="remote" type="(?!.*webapp).*">
|
||||
<input into="organisation">
|
||||
<datastore>organisation</datastore>
|
||||
</input>
|
||||
<input into="business_name">
|
||||
<datastore access_json="['business_name']">organisation</datastore>
|
||||
</input>
|
||||
<input into="person">
|
||||
<datastore access_json="['manager']">organisation</datastore>
|
||||
<input into="strings_to_leak">
|
||||
<value/>
|
||||
</input>
|
||||
</vulnerability>
|
||||
|
||||
<vulnerability privilege="root_rwx" access="local">
|
||||
<input into="business_domain">
|
||||
<datastore access_json="['domain']">organisation</datastore>
|
||||
<input into="organisation">
|
||||
<datastore >organisation</datastore>
|
||||
</input>
|
||||
<input into="business_name">
|
||||
<datastore access_json="['business_name']">organisation</datastore>
|
||||
</input>
|
||||
<input into="person">
|
||||
<datastore access_json="['manager']">organisation</datastore>
|
||||
<input into="strings_to_leak">
|
||||
<value/>
|
||||
</input>
|
||||
</vulnerability>
|
||||
|
||||
@@ -74,13 +71,14 @@
|
||||
<datastore access="next">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
<!--<network module_path=".*private_network_1"/>-->
|
||||
<!--<network module_path=".*private_network_2"/>-->
|
||||
</system>
|
||||
|
||||
<!-- Intranet Server on NIC 2 -->
|
||||
<system>
|
||||
<system_name>intranet_server</system_name>
|
||||
<base platform="linux" distro="Debian 9" type="server"/>
|
||||
|
||||
<system_name>intranet</system_name>
|
||||
<base platform="linux" type="server"/>
|
||||
|
||||
<!-- Web server hosting acceptable use policy and security audit remit -->
|
||||
<service module_path="services/unix/http/parameterised_website">
|
||||
@@ -164,6 +162,7 @@
|
||||
<datastore access="next">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
<!--<network module_path=".*private_network_2"/>-->
|
||||
</system>
|
||||
|
||||
<!--Desktop Client on NIC2 -->
|
||||
@@ -193,7 +192,7 @@
|
||||
<datastore access="next">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
|
||||
<!--<network module_path=".*private_network_2"/>-->
|
||||
</system>
|
||||
|
||||
<system>
|
||||
@@ -204,6 +203,7 @@
|
||||
<datastore access="next">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
<!--<network module_path=".*private_network_2"/>-->
|
||||
</system>
|
||||
|
||||
<system>
|
||||
|
||||
Reference in New Issue
Block a user