Z. Cliffe Schreuders
|
60e855555d
|
nostromo module
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
|
2021-12-10 16:39:35 +00:00 |
|
Z. Cliffe Schreuders
|
555a1736e6
|
pachev vuln module and scenarios
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
|
2021-12-01 12:10:22 +00:00 |
|
Z. Cliffe Schreuders
|
e3d2e01a11
|
sudo module and cleanup
|
2021-11-18 16:16:51 +00:00 |
|
Z. Cliffe Schreuders
|
e13e15efd6
|
bludit module
|
2021-11-10 14:08:22 +00:00 |
|
Z. Cliffe Schreuders
|
a89506f82e
|
select base on attributes rather than path fixes #192
|
2021-05-20 09:10:03 +01:00 |
|
Z. Cliffe Schreuders
|
86bce6cc67
|
randomly vuln webapp updates
Co-Authored-By: Josh1438 <Josh1438@Josh1438>
|
2020-02-28 14:01:49 +00:00 |
|
Z. Cliffe Schreuders
|
b5f39b3a43
|
Commando a bunch of modules for generating a randomised vulnerable web app with randomised table names, XSS, SQLi, etc.
Co-Authored-By: Josh1438 <Josh1438@Josh1438>
|
2020-02-24 23:28:49 +00:00 |
|
Z. Cliffe Schreuders
|
aef83e33a8
|
WebGoat 8 and WebWolf -- using Java 11 working on Kali
|
2019-11-29 11:49:32 +00:00 |
|
Z. Cliffe Schreuders
|
ce61a1c0f6
|
scenario module_path updates
|
2019-11-28 15:51:53 +00:00 |
|
Z. Cliffe Schreuders
|
02c7c57a13
|
remove ambiguity from module path selections in scenarios
|
2019-11-28 09:54:55 +00:00 |
|
Z. Cliffe Schreuders
|
8d60442f23
|
path env CTF module
|
2019-06-24 23:23:14 +01:00 |
|
Z. Cliffe Schreuders
|
c10a35691e
|
Merge major changes from Semester 2 into master
|
2019-06-18 14:37:47 +01:00 |
|
Jason Zeller
|
adb0c6fa86
|
Create example scenarios for pcap and zip.
|
2019-03-13 18:07:48 -05:00 |
|
Jason Zeller
|
df2be07ffe
|
Renamed ncrack vulnerability to match jtr. Generated an example scenario for using crackable_user_accounts.
|
2019-03-13 16:39:06 -05:00 |
|
Z. Cliffe Schreuders
|
53bba11133
|
lab updates (and related modules)
(cherry picked from commit 665b0589c8)
|
2019-02-14 14:59:50 +00:00 |
|
ts
|
b60f421d47
|
scenarios/examples/vulnerability_examples/dirtycow.xml
|
2019-02-05 17:30:40 +00:00 |
|
ts
|
c9fc118a69
|
access_control_misconfigurations: added tests + updated module names + scenarios that referred to old names
|
2019-02-05 13:27:46 +00:00 |
|
ts
|
a8afae3569
|
suid root bash tests + name update
|
2019-02-05 12:15:26 +00:00 |
|
Z. Cliffe Schreuders
|
665b0589c8
|
lab updates (and related modules)
|
2019-01-26 20:11:17 +00:00 |
|
ts
|
f0bb2a26e1
|
Testing script, stretch fixes + code review
|
2018-10-19 13:46:49 +01:00 |
|
ts
|
ff75b56c6b
|
Testing script, stretch fixes + code review
|
2018-10-05 17:27:12 +01:00 |
|
ts
|
9d66ea9215
|
Squashed WNS + IRI DL work
|
2018-10-05 17:27:05 +01:00 |
|
ts
|
5208ae5cc7
|
Squashed WNS + IRI DL work
|
2018-09-21 12:34:26 +01:00 |
|
Z. Cliffe Schreuders
|
25d19b983f
|
dvwa module
|
2018-02-19 23:36:17 +00:00 |
|
thomashaw
|
b5bb17ee59
|
minor improvements to leaked_file permissions, metadata, and scenarios
|
2017-09-20 22:08:40 +01:00 |
|
thomashaw
|
0d5bd58fdc
|
scenarios: updating base box selectors to include type="server" (along side platform="linux") in preparation for kali basebox merge
|
2017-08-19 13:52:03 +01:00 |
|
Z. Cliffe Schreuders
|
246443bb5e
|
ssh root login vulnerability, and some other code cleanup
|
2017-08-03 22:39:43 +01:00 |
|
thomashaw
|
ebb0ded6e0
|
moved relevant example.xml's to ctf_module_examples
|
2017-06-08 11:24:37 +01:00 |
|
thomashaw
|
210f5cdfbe
|
new module: ctf/hidden_file - drops a hidden linux file prepended with a dot, containing a flag, into either the provided account's home directory OR the provided storage_directory
|
2017-06-08 11:24:23 +01:00 |
|
thomashaw
|
ada45e9420
|
New function: secgen_functions::install_setuid_root_binary
Updated dc16_amadhj to use this function
|
2017-06-06 11:26:34 +01:00 |
|
thomashaw
|
5e7689316b
|
vulnerabilities/parameterised_accounts => utilities/parameterised_accounts
|
2017-05-24 13:01:42 +01:00 |
|
thomashaw
|
c4d9d229d9
|
example scenario.xml: uid_less_root, uid_vi_root
|
2017-05-24 10:03:15 +01:00 |
|
thomashaw
|
0b4a153c2b
|
uid_bash_root example scenario.xml
|
2017-05-24 10:01:11 +01:00 |
|
thomashaw
|
48385db779
|
access control misconfiguration: writable_passwd -- enforced the order in accounts::users w/ multiple ac misconfigs at same time
|
2017-05-23 17:51:27 +01:00 |
|
thomashaw
|
c39ec63434
|
Enforce run order of parameterised_accounts and writable_groups
|
2017-05-22 16:47:24 +01:00 |
|
thomashaw
|
93759154ee
|
s/writeable/writable
|
2017-05-22 13:37:21 +01:00 |
|
thomashaw
|
aebf8c135a
|
renamed writeable => writable
|
2017-05-22 13:36:36 +01:00 |
|
thomashaw
|
152f59e3f1
|
access control misconfiguration: writable groups
|
2017-05-22 13:30:23 +01:00 |
|
thomashaw
|
e283775ed3
|
access control misconfiguration: writable shadow
|
2017-05-22 13:29:46 +01:00 |
|
thomashaw
|
49c5fdee3f
|
readable_shadow scenario updated
|
2017-05-22 13:10:25 +01:00 |
|
thomashaw
|
0155018879
|
access control misconfiguration: readable /etc/shadow file
|
2017-05-22 12:45:45 +01:00 |
|
thomashaw
|
2b93c8c20d
|
access control misconfiguration: suid_root_nano
|
2017-05-22 11:53:25 +01:00 |
|
thomashaw
|
58907d171d
|
parameterised online_store
|
2017-05-11 15:02:56 +01:00 |
|
thomashaw
|
0b99e58c27
|
CTF module - vulnerabilities/unix/webapp/onlinestore (by Meehein @ University of Birmingham)
|
2017-04-18 15:46:13 +01:00 |
|
thomashaw
|
398ca4df47
|
vulnerabilities/unix/system/symlinks - CTF module with symlink (TOCTTOU) vulnerability with binary setgid shadow + crackable weak password
|
2017-04-18 14:37:16 +01:00 |
|
thomashaw
|
ce9a6f3de7
|
CTF module - vulnerabilities/unix/system/two_shell_calls (by Meehein @ University of Birmingham)
|
2017-04-14 12:44:58 +01:00 |
|
thomashaw
|
03aaae2bc3
|
xfce desktop environment: extracted out auto login as root into vulnerability module
|
2017-03-24 15:30:30 +00:00 |
|
thomashaw
|
378bfcda69
|
ssh_leaked_keys example scenario
|
2017-03-20 14:02:43 +00:00 |
|
Z. Cliffe Schreuders
|
6a14c417c6
|
marker.xml for marking CTF flags and providing hints (which have IDs so we don't have to give the same hint twice), also updated organisation of scenarios
|
2017-03-14 17:30:33 +00:00 |
|