secgen_server push

This commit is contained in:
secgen server
2018-03-21 20:23:26 +00:00
parent 115f5f5cd0
commit 3069dee9b0
4 changed files with 22 additions and 12 deletions

View File

@@ -137,7 +137,7 @@ Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
<% end %>
<% else -%>
<% if (@options.has_key? :ovirtuser) && (@options.has_key? :ovirtpass) %>
<% if @ovirt_template and @ovirt_template.include? 'kali_linux_msf' %>
<% if @ovirt_template and (@ovirt_template.include? 'kali_linux_msf' or @ovirt_template.include? 'debian_stretch_server_n') %>
<%= system.name %>.vm.provision 'shell', inline: "echo \"auto lo\niface lo inet loopback\n\nauto eth0\niface eth0 inet static\n\taddress <%= resolve_network(selected_module)%>\" > /etc/network/interfaces"
<%= system.name %>.vm.provision 'shell', inline: "echo '' > /etc/environment"
<% elsif @ovirt_template and @ovirt_template.include? 'debian_desktop_kde' %>

View File

@@ -15,7 +15,7 @@
<platform>unix</platform>
<distro>Debian 9 (stretch) TODO: 32-bit (i386)</distro>
<url>https://app.vagrantup.com/summernguyen/boxes/debian-stretch-puppet/versions/1.0.0/providers/virtualbox.box</url>
<ovirt_template>debian_stretch_server</ovirt_template>
<ovirt_template>debian_stretch_server_n</ovirt_template>
<reference>https://atlas.hashicorp.com/puppetlabs</reference>
<software_license>various</software_license>

View File

@@ -1,5 +1,5 @@
class wordpress::conf ($version){
file { '/tmp/wordpress_conf.sh':
file { '/wordpress_conf.sh':
owner => 'root',
group => 'root',
ensure => present,
@@ -7,8 +7,8 @@ class wordpress::conf ($version){
content => template('wordpress/wordpress_conf.sh.erb'),
}
exec { 'run wordpress config script':
command => '/bin/bash /tmp/wordpress_conf.sh',
require => File['/tmp/wordpress_conf.sh'],
}
}
# exec { 'run wordpress config script':
# command => '/bin/bash /tmp/wordpress_conf.sh',
# require => File['/tmp/wordpress_conf.sh'],
# }
}

View File

@@ -7,11 +7,21 @@
<!-- an example remote storage system, with a remotely exploitable vulnerability that can then be escalated to root -->
<system>
<system_name>apache_https</system_name>
<base platform="linux" type="server" />
<base platform="linux" type="server" module_path=".*stretch.*"/>
<input into_datastore="IP_addresses">
<value>172.16.0.2</value>
</input>
<vulnerability module_path=".*gitlist_040.*" />
<network type="private_network" range="172.16.0.0"/>
<vulnerability module_path=".*wordpress.*" >
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</network>
</system>
</scenario>