Commit Graph

7 Commits

Author SHA1 Message Date
ts
9d664ad677 Merge branch 'post_tests' into s2progress
# Conflicts:
#	modules/generators/structured_content/hackerbot_config/hbauthentication/secgen_metadata.xml
#	modules/generators/structured_content/hackerbot_config/hbauthentication/templates/intro.md.erb
#	modules/generators/structured_content/hackerbot_config/hbauthentication/templates/lab.xml.erb
#	modules/vulnerabilities/unix/access_control_misconfigurations/suid_root_bash/suid_root_bash.pp
#	modules/vulnerabilities/unix/access_control_misconfigurations/suid_root_vi/suid_root_vi.pp
#	modules/vulnerabilities/unix/web_training/dvwa/files/DVWA-master/vulnerabilities/csp/help/help.php
#	modules/vulnerabilities/unix/web_training/dvwa/manifests/apache.pp
#	scenarios/ctf/basic_narrative.xml
#	scenarios/labs/websec_lab_env.xml
#	scenarios/security_audit/team_project.xml
2019-02-15 18:18:30 +00:00
ts
fda7a01dff Semester 2 team project scenario required changes 2019-02-07 14:32:14 +00:00
ts
d655b3d226 updated tests + team project 2019-02-07 11:11:50 +00:00
ts
634efdcc83 Stretch update merge: mysql & php for stretch, module conflicts and general cleanup 2018-10-09 09:09:12 +01:00
ts
ff75b56c6b Testing script, stretch fixes + code review 2018-10-05 17:27:12 +01:00
thomashaw
d9d785f335 Metadata: Updated shellshock privilege = none, access = local 2016-09-06 13:46:31 +01:00
thomashaw
60cd05536d Vulnerability: Shellshock in bash & Service: apache server with cgi hosting a bash script
New scenario combines the two & is exploitable with msf module: exploit/multi/http/apache_mod_cgi_bash_env_exec
2016-09-04 22:15:28 +01:00