test_scenario_wp2.xml: 2 stretch vms http/https; 2 wheezy vms http/https

This commit is contained in:
ts
2019-01-22 10:40:07 +00:00
parent 723813fb11
commit fc4b86757b
5 changed files with 375 additions and 0 deletions

View File

@@ -0,0 +1,79 @@
<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<system>
<system_name>wordpress_2x_stretch</system_name>
<base platform="linux" distro="Debian 9" type="server"/>
<input into_datastore="IP_addresses">
<value>172.16.0.5</value>
<value>172.16.0.6</value>
<value>172.16.0.7</value>
</input>
<vulnerability module_path=".*wordpress_2x.*">
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</network>
</system>
<!--<system>-->
<!--<system_name>wordpress_2x_wheezy</system_name>-->
<!--<base platform="linux" distro="Debian 7.8" type="server"/>-->
<!--<input into_datastore="IP_addresses">-->
<!--<value>172.16.0.5</value>-->
<!--<value>172.16.0.6</value>-->
<!--<value>172.16.0.7</value>-->
<!--</input>-->
<!--<vulnerability module_path=".*wordpress_2x.*">-->
<!--<input into="IP_address">-->
<!--<datastore access="1">IP_addresses</datastore>-->
<!--</input>-->
<!--</vulnerability>-->
<!--<network type="private_network">-->
<!--<input into="IP_address">-->
<!--<datastore access="1">IP_addresses</datastore>-->
<!--</input>-->
<!--</network>-->
<!--</system>-->
<!--<system>-->
<!--<system_name>wordpress_3x_stretch</system_name>-->
<!--<base platform="linux" distro="Debian 9" type="server"/>-->
<!---->
<!--<vulnerability module_path=".*wordpress_3x.*"/>-->
<!---->
<!--<network type="private_network">-->
<!--<input into="IP_address">-->
<!--<datastore access="next">IP_addresses</datastore>-->
<!--</input>-->
<!--</network>-->
<!--</system>-->
<!--<system>-->
<!--<system_name>wordpress_4x_stretch</system_name>-->
<!--<base platform="linux" distro="Debian 9" type="server"/>-->
<!--<vulnerability module_path=".*wordpress_4x.*"/>-->
<!--<network type="private_network">-->
<!--<input into="IP_address">-->
<!--<datastore access="next">IP_addresses</datastore>-->
<!--</input>-->
<!--</network>-->
<!--</system>-->
</scenario>

View File

@@ -0,0 +1,45 @@
<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<system>
<system_name>onlinestore_stretch</system_name>
<base platform="linux" distro="Debian 9" type="server"/>
<input into_datastore="IP_addresses">
<value>172.16.0.2</value>
<value>172.16.0.3</value>
</input>
<vulnerability module_path=".*onlinestore.*">
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</network>
</system>
<system>
<system_name>onlinestore_stretch</system_name>
<base platform="linux" distro="Debian 9" type="server"/>
<vulnerability module_path=".*onlinestore.*">
<input into="IP_address">
<datastore access="1">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="1">IP_addresses</datastore>
</input>
</network>
</system>
</scenario>

View File

@@ -0,0 +1,102 @@
<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<!--<system>-->
<!--<system_name>wp_2x_stretch_https</system_name>-->
<!--<base platform="linux" distro="Debian 9" type="server"/>-->
<!--<input into_datastore="IP_addresses">-->
<!--<value>172.16.0.2</value>-->
<!--<value>172.16.0.3</value>-->
<!--<value>172.16.0.4</value>-->
<!--<value>172.16.0.5</value>-->
<!--</input>-->
<!--<vulnerability module_path=".*wordpress_2x.*">-->
<!--<input into="https">-->
<!--<value>true</value>-->
<!--</input>-->
<!--<input into="IP_address">-->
<!--<datastore access="0">IP_addresses</datastore>-->
<!--</input>-->
<!--</vulnerability>-->
<!--<network type="private_network">-->
<!--<input into="IP_address">-->
<!--<datastore access="0">IP_addresses</datastore>-->
<!--</input>-->
<!--</network>-->
<!--</system>-->
<!--<system>-->
<!--<system_name>wp_2x_stretch_http</system_name>-->
<!--<base platform="linux" distro="Debian 9" type="server"/>-->
<!--<vulnerability module_path=".*wordpress_2x.*">-->
<!--<input into="https">-->
<!--<value>false</value>-->
<!--</input>-->
<!--<input into="IP_address">-->
<!--<datastore access="1">IP_addresses</datastore>-->
<!--</input>-->
<!--</vulnerability>-->
<!--<network type="private_network">-->
<!--<input into="IP_address">-->
<!--<datastore access="1">IP_addresses</datastore>-->
<!--</input>-->
<!--</network>-->
<!--</system>-->
<system>
<system_name>wp_2x_wheezy_https</system_name>
<base platform="linux" distro="Debian 7.8" type="server"/>
<input into_datastore="IP_addresses">
<value>172.16.0.2</value>
<value>172.16.0.3</value>
<value>172.16.0.4</value>
<value>172.16.0.5</value>
</input>
<vulnerability module_path=".*wordpress_2x.*">
<input into="https">
<value>true</value>
</input>
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</network>
</system>
<system>
<system_name>wp_2x_wheezy_http</system_name>
<base platform="linux" distro="Debian 7.8" type="server"/>
<vulnerability module_path=".*wordpress_2x.*">
<input into="https">
<value>false</value>
</input>
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</network>
</system>
</scenario>

View File

@@ -0,0 +1,95 @@
<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<system>
<system_name>wordpress_3x_stretch_https</system_name>
<base platform="linux" distro="Debian 9" type="server"/>
<input into_datastore="IP_addresses">
<value>172.16.0.2</value>
<value>172.16.0.3</value>
<value>172.16.0.4</value>
<value>172.16.0.5</value>
</input>
<vulnerability module_path=".*wordpress_3x.*">
<input into="https">
<value>true</value>
</input>
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</network>
</system>
<system>
<system_name>wordpress_3x_stretch_http</system_name>
<base platform="linux" distro="Debian 9" type="server"/>
<vulnerability module_path=".*wordpress_3x.*">
<input into="https">
<value>false</value>
</input>
<input into="IP_address">
<datastore access="1">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="1">IP_addresses</datastore>
</input>
</network>
</system>
<system>
<system_name>wordpress_3x_wheezy_https</system_name>
<base platform="linux" distro="Debian 7.8" type="server"/>
<vulnerability module_path=".*wordpress_3x.*">
<input into="https">
<value>true</value>
</input>
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</network>
</system>
<system>
<system_name>wordpress_3x_wheezy_http</system_name>
<base platform="linux" distro="Debian 7.8" type="server"/>
<vulnerability module_path=".*wordpress_3x.*">
<input into="https">
<value>false</value>
</input>
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</network>
</system>
</scenario>

View File

@@ -0,0 +1,54 @@
<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<system>
<system_name>wordpress_4x_stretch_https</system_name>
<base platform="linux" distro="Debian 9" type="server"/>
<input into_datastore="IP_addresses">
<value>172.16.0.2</value>
<value>172.16.0.3</value>
<value>172.16.0.4</value>
<value>172.16.0.5</value>
</input>
<vulnerability module_path=".*wordpress_4x.*">
<input into="https">
<value>true</value>
</input>
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="0">IP_addresses</datastore>
</input>
</network>
</system>
<system>
<system_name>wordpress_4x_stretch_http</system_name>
<base platform="linux" distro="Debian 9" type="server"/>
<vulnerability module_path=".*wordpress_4x.*">
<input into="https">
<value>false</value>
</input>
<input into="IP_address">
<datastore access="1">IP_addresses</datastore>
</input>
</vulnerability>
<network type="private_network">
<input into="IP_address">
<datastore access="1">IP_addresses</datastore>
</input>
</network>
</system>
</scenario>