Commit Graph

86 Commits

Author SHA1 Message Date
Jjk422
880b42e200 Requested changes have been made:
secgen_metadata.xml:7 :: Removed line
smbclient_utility.xml:8 :: Corrected smbclinet_utility to smbclient_utility.
2016-09-20 08:53:24 +01:00
Jjk422
eb55b69dff Smbclient utility module.
Scenario file found at '/home/user/RubymineProjects/SecGen/scenarios/simple_examples/smbclient_utility.xml'
2016-09-13 12:05:08 +01:00
Jjk422
4f53a7f770 Merge pull request #70 from thomashaw/nmap_setuid_rebase
Tested, exploitable although multiple exploits needed to exploit the box.
Ready to be merged.
2016-09-07 15:01:58 +01:00
thomashaw
4528467f04 Vulnerability: Nmap setuid local privilege escalation 2016-09-06 15:34:12 +01:00
Jjk422
18268af6c9 Merge pull request #69 from thomashaw/shellshock_rebase
Tested and seems to be fully working.
2016-09-06 15:17:28 +01:00
thomashaw
d9d785f335 Metadata: Updated shellshock privilege = none, access = local 2016-09-06 13:46:31 +01:00
thomashaw
d3194f4d56 Fix: Added a file resource for the /usr/lib/cgi-bin/ directory. 2016-09-06 13:21:00 +01:00
Jjk422
bc9db957e3 Merge pull request #67 from thomashaw/samba_overshare_rebase
Happy with this branch, don't think we need to change anything so merging, although the samba service module versioning may come back to bite us, but we can deal with that when we get to it.
2016-09-06 13:15:44 +01:00
Tom
27dc5c3b9e Merge pull request #66 from Jjk422/new_access_control_misconfigurations_uid_less_running_as_root
Access control vulnerability, allows less to run as root for any user.
2016-09-06 13:10:22 +01:00
thomashaw
60cd05536d Vulnerability: Shellshock in bash & Service: apache server with cgi hosting a bash script
New scenario combines the two & is exploitable with msf module: exploit/multi/http/apache_mod_cgi_bash_env_exec
2016-09-04 22:15:28 +01:00
thomashaw
e997c545f0 Removed 'Modulefile' as when unrealirc was selected puppet-librarian caused errors (as it tries to parse Modulefile's contents) 2016-09-03 00:31:47 +01:00
thomashaw
3f00728fd2 Vulnerability: samba anonymously writable share + symlink traversal 2016-09-02 19:55:42 +01:00
Tom
e7db9e1c2d Merge pull request #65 from Jjk422/new_user_account_module_pull_request
Adds a user account module.
2016-09-02 12:46:38 +01:00
Jjk422
51bbf5c7c3 Should fix all errors in branch 'Access control vulnerability, allows less to run as root for any user'.
required:
/access_control_misconfigurations/uid_less_root/manifests/change_uid_permissions.pp:4: Comments removed.
/access_control_misconfigurations/uid_less_root/manifests/change_uid_permissions.pp:10-15: Comments removed.

optional / suggested:
/access_control_misconfigurations/uid_less_root/manifests/change_uid_permissions.pp:1: $user parameter kept, module should be able to be copied and used for other modules (changing user permissions or different files) to ensure that all code is the same and checked <-- this was my thinking anyway.
/access_control_misconfigurations/uid_less_root/manifests/change_uid_permissions.pp:2: Removed the 'String' from before the block parameter definitions.
/access_control_misconfigurations/uid_less_root/manifests/change_uid_permissions.pp:3-8(post comment removal): Indented the block by two spaces.
2016-09-01 16:36:13 +01:00
Jjk422
bacf8f8278 Fix for errors in the pull request.
Reverted the following:
documentation/yard/rakefile.rb
lib/schemas/service_metadata_schema.xsd
modules/services/unix/database/mysql/*

Removed comments in the following:
scenarios/simple_examples/user_test_scenario.xml:11
modules/utilities/unix/system/accounts/secgen_metadata.xml:20
2016-09-01 16:14:04 +01:00
Jjk422
d49cb521cc Access control vulnerability, allows less to run as root for any user.
Access_control_misconfigurations_uid_less_root.xml can be used to test this
2016-09-01 10:06:00 +01:00
Tom
c37d88e7e5 Merge pull request #64 from Jjk422/new_access_control_vulnerability_vi_running_as_root
Access control misconfiguration module that ensures the vi text edit…
2016-08-31 15:57:34 +01:00
Tom
50e0c5d683 Merge pull request #62 from thomashaw/unreal_rework
unrealirc_3281_backdoor vulnerability refactored.
2016-08-31 15:08:02 +01:00
Jjk422
be636f7b42 Adds a user account module, currently not modifiable by facter or scenarios files but will be added when parametrization is merged.
Currently creates a user account named user with the password as password.
Home directory in /home/user.
Shell as /bin/bash.
2016-08-31 13:18:48 +01:00
Jjk422
b29c08a8b5 Fixed mislabeled secgen_metadata.xml <privilege> tag from user to root. 2016-08-31 09:42:02 +01:00
Jjk422
94d6d00112 Access control misconfiguration module that ensures the vi text editor runs at root.
Scenario file at access_control_misconfigurations_uid_vi_root.xml.
2016-08-29 10:36:46 +01:00
thomashaw
b8cc50b549 separated the vulnerable code out and used require to manipulate order 2016-08-18 20:58:04 +01:00
thomashaw
535017058a unrealirc_3281_backdoor vulnerability refactored.
Vulnerable code now held within the service module and conditionally run based on whether the unrealirc_3281_backdoor class has been included. Reduced duplicate code.

Going to follow this pattern for misconfiguration vulnerabilities as modifying the same resources from different classes/namespaces within puppet causes issues.
2016-08-17 16:04:28 +01:00
Jjk422
c63369f81f Fix for the samba module, merge of legacy code into Cliffe/master left module broken.
Removed all legacy and non samba related code.
Tested and seems to be working.
2016-08-15 17:19:39 +01:00
thomashaw
0eb38e1d1b Moved windows update to utilities 2016-08-01 23:59:14 +01:00
thomashaw
8b32a8dc62 Feature: Utilities - extracted services which do not run on a network socket e.g. package manager update, firewall rules, java etc. into utilities 2016-08-01 18:55:50 +01:00
thomashaw
e14a0f75df post-dependencies tidy up 2016-08-01 18:13:30 +01:00
Tom
29b58b325f Merge pull request #55 from cliffe/module_dependencies
Module dependencies
2016-07-30 11:45:29 +01:00
thomashaw
e9f1b87774 Removed testing comments 2016-07-30 11:45:06 +01:00
Jjk422
b46baf96bd Merge pull request #53 from thomashaw/moinmoin_vuln
Vulnerability: MoinMoin-1.9.5 wiki
Checked and working
2016-07-27 19:07:21 +01:00
thomashaw
a723226865 Vulnerability: MoinMoin-1.9.5 wiki 2016-07-27 12:37:19 +01:00
Z. Cliffe Schreuders
6e6df008b9 Module dependencies 2016-07-27 09:51:13 +01:00
Tom
d0c464019f Merge pull request #50 from Jjk422/new_nginx_service_module
Nginx service module, should be fully working and secure.
2016-07-25 06:46:54 +01:00
Jjk422
8c7c2bac60 Changes:
config/scenario.xml - old scenario file deleted
secgen_metadata.xml:18: removed comment from tag on this line
2016-07-23 09:52:22 +01:00
Tom
d0e0a3c68c Merge pull request #46 from Jjk422/new_vsftpd_service_module
Secure vsftpd module
2016-07-23 08:59:07 +01:00
Tom
7d842e14f8 Merge pull request #40 from Jjk422/new_java_service_module
Java install module
2016-07-23 08:58:45 +01:00
Jjk422
4cc2e6b31c Nginx service module, should be fully working and secure.
Default index.html file and directory used.
Can connect via browser on host machine via nginx_service.xml file.
2016-07-22 11:26:07 +01:00
Jjk422
8bd2a502b7 Merge pull request #49 from cliffe/firewall_remove_update
Firewall merge small changes to demonstrate scenario creation pre-dependencies.
Working and tested.
No errors stand out in the code
2016-07-21 12:59:27 +01:00
Jjk422
49467bcd9e Merge pull request #45 from thomashaw/vsftpd_backdoor
Vulnerability: vsftpd_234_backdoor rewrite:
Tested and exploitable with vsftpd_234_backdoor vulnerability
2016-07-21 12:39:29 +01:00
Jjk422
6b09463f8a A few minor changes to comments:
secgen_metadata.xml:20 - removed comment as not apache installation so not needed.
 java.pp:1-3 - update step removed here and example I used in #49 followed to allow for dependencies code to be used in the future.
java_service.xml:7 updated comment to reflect that the service is a java language installation
2016-07-21 11:30:22 +01:00
Jjk422
24f4d4046d A few minor changes to comments:
Removed secgen_metadata.xml line 20 comment as not apache installation so not needed.
Updated the vsftpd_service.xml line 7 comment to reflect that the service is a secure ftp service.
2016-07-21 10:23:51 +01:00
thomashaw
6fd6de8aff Firewall merge small changes to demonstrate scenario creation pre-dependencies. 2016-07-19 15:01:51 +01:00
Tom
a3afb7e036 Merge pull request #38 from Jjk422/new_firewall_service_module
Iptables firewall configure
2016-07-19 14:34:23 +01:00
Jjk422
b36fe6070a Spelling mistake in file secgen_metadata.xml
Spelling mistake in file secgen_metadata.xml, to small to warrant a pull request.
2016-06-28 10:52:21 +01:00
Jjk422
98e9e2fd39 Secure vsftpd module. Login currently is via username:user and password:user. Has 2 test files and one test directory, shouldn't be able to log in as root or access root files .e.g '/etc/shadow'. 2016-06-23 11:33:36 +01:00
thomashaw
72dad41881 Vulnerability: vsftpd_234_backdoor rewrite 2016-06-21 20:35:16 +01:00
Connor Wilson
bc687a8cd6 Merge pull request #42 from Jjk422/new_ntp_service_module
Ntp service module confirmed installed and running post-restart.
2016-06-19 13:11:42 +01:00
Connor Wilson
90319741bb Merge pull request #44 from thomashaw/unreal_ircd_rework
Confirmed both vulnerable and secure services running, vulnerable service is exploitable, secure service is secure. Merging.
2016-06-19 12:48:31 +01:00
thomashaw
c12ff5c270 Service: UnrealIRCd module 2016-06-18 19:58:45 +01:00
thomashaw
31c49d81ff Vulnerability: UnrealIRCd backdoor 2016-06-18 19:58:33 +01:00