Commit Graph

49 Commits

Author SHA1 Message Date
Z. Cliffe Schreuders
60e855555d nostromo module
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
2021-12-10 16:39:35 +00:00
Z. Cliffe Schreuders
555a1736e6 pachev vuln module and scenarios
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
2021-12-01 12:10:22 +00:00
Z. Cliffe Schreuders
e3d2e01a11 sudo module and cleanup 2021-11-18 16:16:51 +00:00
Z. Cliffe Schreuders
e13e15efd6 bludit module 2021-11-10 14:08:22 +00:00
Z. Cliffe Schreuders
a89506f82e select base on attributes rather than path fixes #192 2021-05-20 09:10:03 +01:00
Z. Cliffe Schreuders
86bce6cc67 randomly vuln webapp updates
Co-Authored-By: Josh1438 <Josh1438@Josh1438>
2020-02-28 14:01:49 +00:00
Z. Cliffe Schreuders
b5f39b3a43 Commando a bunch of modules for generating a randomised vulnerable web app with randomised table names, XSS, SQLi, etc.
Co-Authored-By: Josh1438 <Josh1438@Josh1438>
2020-02-24 23:28:49 +00:00
Z. Cliffe Schreuders
aef83e33a8 WebGoat 8 and WebWolf -- using Java 11 working on Kali 2019-11-29 11:49:32 +00:00
Z. Cliffe Schreuders
ce61a1c0f6 scenario module_path updates 2019-11-28 15:51:53 +00:00
Z. Cliffe Schreuders
02c7c57a13 remove ambiguity from module path selections in scenarios 2019-11-28 09:54:55 +00:00
Z. Cliffe Schreuders
8d60442f23 path env CTF module 2019-06-24 23:23:14 +01:00
Z. Cliffe Schreuders
c10a35691e Merge major changes from Semester 2 into master 2019-06-18 14:37:47 +01:00
Jason Zeller
adb0c6fa86 Create example scenarios for pcap and zip. 2019-03-13 18:07:48 -05:00
Jason Zeller
df2be07ffe Renamed ncrack vulnerability to match jtr. Generated an example scenario for using crackable_user_accounts. 2019-03-13 16:39:06 -05:00
Z. Cliffe Schreuders
53bba11133 lab updates (and related modules)
(cherry picked from commit 665b0589c8)
2019-02-14 14:59:50 +00:00
ts
b60f421d47 scenarios/examples/vulnerability_examples/dirtycow.xml 2019-02-05 17:30:40 +00:00
ts
c9fc118a69 access_control_misconfigurations: added tests + updated module names + scenarios that referred to old names 2019-02-05 13:27:46 +00:00
ts
a8afae3569 suid root bash tests + name update 2019-02-05 12:15:26 +00:00
Z. Cliffe Schreuders
665b0589c8 lab updates (and related modules) 2019-01-26 20:11:17 +00:00
ts
f0bb2a26e1 Testing script, stretch fixes + code review 2018-10-19 13:46:49 +01:00
ts
ff75b56c6b Testing script, stretch fixes + code review 2018-10-05 17:27:12 +01:00
ts
9d66ea9215 Squashed WNS + IRI DL work 2018-10-05 17:27:05 +01:00
ts
5208ae5cc7 Squashed WNS + IRI DL work 2018-09-21 12:34:26 +01:00
Z. Cliffe Schreuders
25d19b983f dvwa module 2018-02-19 23:36:17 +00:00
thomashaw
b5bb17ee59 minor improvements to leaked_file permissions, metadata, and scenarios 2017-09-20 22:08:40 +01:00
thomashaw
0d5bd58fdc scenarios: updating base box selectors to include type="server" (along side platform="linux") in preparation for kali basebox merge 2017-08-19 13:52:03 +01:00
Z. Cliffe Schreuders
246443bb5e ssh root login vulnerability, and some other code cleanup 2017-08-03 22:39:43 +01:00
thomashaw
ebb0ded6e0 moved relevant example.xml's to ctf_module_examples 2017-06-08 11:24:37 +01:00
thomashaw
210f5cdfbe new module: ctf/hidden_file - drops a hidden linux file prepended with a dot, containing a flag, into either the provided account's home directory OR the provided storage_directory 2017-06-08 11:24:23 +01:00
thomashaw
ada45e9420 New function: secgen_functions::install_setuid_root_binary
Updated dc16_amadhj to use this function
2017-06-06 11:26:34 +01:00
thomashaw
5e7689316b vulnerabilities/parameterised_accounts => utilities/parameterised_accounts 2017-05-24 13:01:42 +01:00
thomashaw
c4d9d229d9 example scenario.xml: uid_less_root, uid_vi_root 2017-05-24 10:03:15 +01:00
thomashaw
0b4a153c2b uid_bash_root example scenario.xml 2017-05-24 10:01:11 +01:00
thomashaw
48385db779 access control misconfiguration: writable_passwd -- enforced the order in accounts::users w/ multiple ac misconfigs at same time 2017-05-23 17:51:27 +01:00
thomashaw
c39ec63434 Enforce run order of parameterised_accounts and writable_groups 2017-05-22 16:47:24 +01:00
thomashaw
93759154ee s/writeable/writable 2017-05-22 13:37:21 +01:00
thomashaw
aebf8c135a renamed writeable => writable 2017-05-22 13:36:36 +01:00
thomashaw
152f59e3f1 access control misconfiguration: writable groups 2017-05-22 13:30:23 +01:00
thomashaw
e283775ed3 access control misconfiguration: writable shadow 2017-05-22 13:29:46 +01:00
thomashaw
49c5fdee3f readable_shadow scenario updated 2017-05-22 13:10:25 +01:00
thomashaw
0155018879 access control misconfiguration: readable /etc/shadow file 2017-05-22 12:45:45 +01:00
thomashaw
2b93c8c20d access control misconfiguration: suid_root_nano 2017-05-22 11:53:25 +01:00
thomashaw
58907d171d parameterised online_store 2017-05-11 15:02:56 +01:00
thomashaw
0b99e58c27 CTF module - vulnerabilities/unix/webapp/onlinestore (by Meehein @ University of Birmingham) 2017-04-18 15:46:13 +01:00
thomashaw
398ca4df47 vulnerabilities/unix/system/symlinks - CTF module with symlink (TOCTTOU) vulnerability with binary setgid shadow + crackable weak password 2017-04-18 14:37:16 +01:00
thomashaw
ce9a6f3de7 CTF module - vulnerabilities/unix/system/two_shell_calls (by Meehein @ University of Birmingham) 2017-04-14 12:44:58 +01:00
thomashaw
03aaae2bc3 xfce desktop environment: extracted out auto login as root into vulnerability module 2017-03-24 15:30:30 +00:00
thomashaw
378bfcda69 ssh_leaked_keys example scenario 2017-03-20 14:02:43 +00:00
Z. Cliffe Schreuders
6a14c417c6 marker.xml for marking CTF flags and providing hints (which have IDs so we don't have to give the same hint twice), also updated organisation of scenarios 2017-03-14 17:30:33 +00:00