mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-22 11:48:17 +00:00
Renamed ncrack vulnerability to match jtr. Generated an example scenario for using crackable_user_accounts.
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
define ncrack_user_account::account($username, $password, $super_user, $strings_to_leak, $leaked_filenames) {
|
||||
define ncrack_crackable_user_account::account($username, $password, $super_user, $strings_to_leak, $leaked_filenames) {
|
||||
# ::accounts::user changes permissions on group, passwd, shadow etc. so needs to run before
|
||||
if defined('writable_groups::config') {
|
||||
include ::writable_groups::config
|
||||
@@ -1,10 +1,10 @@
|
||||
class ncrack_user_account::init {
|
||||
class ncrack_crackable_user_account::init {
|
||||
$secgen_parameters = secgen_functions::get_parameters($::base64_inputs_file)
|
||||
|
||||
$account = parsejson($secgen_parameters['account'][0])
|
||||
$username = $account['username']
|
||||
|
||||
::ncrack_user_account::account { "ncrack_user_account_$username":
|
||||
::ncrack_crackable_user_account::account { "ncrack_crackable_user_account_$username":
|
||||
username => $username,
|
||||
password => $secgen_parameters['password'][0],
|
||||
super_user => str2bool($account['super_user']),
|
||||
@@ -0,0 +1 @@
|
||||
require ncrack_crackable_user_account::init
|
||||
@@ -3,7 +3,7 @@
|
||||
<vulnerability xmlns="http://www.github/cliffe/SecGen/vulnerability"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xsi:schemaLocation="http://www.github/cliffe/SecGen/vulnerability">
|
||||
<name>Crackable User Account</name>
|
||||
<name>NCRACK Crackable User Account</name>
|
||||
<author>Jason Zeller</author>
|
||||
<module_license>MIT</module_license>
|
||||
<description>Unprivileged user account with a password from nCrack dictionary.</description>
|
||||
@@ -1 +0,0 @@
|
||||
require ncrack_user_account::init
|
||||
Reference in New Issue
Block a user