Renamed ncrack vulnerability to match jtr. Generated an example scenario for using crackable_user_accounts.

This commit is contained in:
Jason Zeller
2019-03-13 16:39:06 -05:00
parent 455cb08fbe
commit df2be07ffe
6 changed files with 108 additions and 5 deletions

View File

@@ -1,4 +1,4 @@
define ncrack_user_account::account($username, $password, $super_user, $strings_to_leak, $leaked_filenames) {
define ncrack_crackable_user_account::account($username, $password, $super_user, $strings_to_leak, $leaked_filenames) {
# ::accounts::user changes permissions on group, passwd, shadow etc. so needs to run before
if defined('writable_groups::config') {
include ::writable_groups::config

View File

@@ -1,10 +1,10 @@
class ncrack_user_account::init {
class ncrack_crackable_user_account::init {
$secgen_parameters = secgen_functions::get_parameters($::base64_inputs_file)
$account = parsejson($secgen_parameters['account'][0])
$username = $account['username']
::ncrack_user_account::account { "ncrack_user_account_$username":
::ncrack_crackable_user_account::account { "ncrack_crackable_user_account_$username":
username => $username,
password => $secgen_parameters['password'][0],
super_user => str2bool($account['super_user']),

View File

@@ -0,0 +1 @@
require ncrack_crackable_user_account::init

View File

@@ -3,7 +3,7 @@
<vulnerability xmlns="http://www.github/cliffe/SecGen/vulnerability"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/vulnerability">
<name>Crackable User Account</name>
<name>NCRACK Crackable User Account</name>
<author>Jason Zeller</author>
<module_license>MIT</module_license>
<description>Unprivileged user account with a password from nCrack dictionary.</description>

View File

@@ -1 +0,0 @@
require ncrack_user_account::init