Files
SecGen/scenarios/examples/vulnerability_examples/deleted_files_vulnerability.xml
2023-04-27 17:46:05 +01:00

51 lines
1.4 KiB
XML

<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<!-- an example remote linux system with the ProFTPd 1.3.3c backdoor vulnerability -->
<system>
<system_name>file_server</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>
<input into_datastore="IP_addresses">
<value>172.16.0.2</value>
</input>
<input into_datastore="accounts">
<generator type="account">
<input into="username">
<generator type="random_sanitised_word">
<input into="wordlist">
<value>mythical_creatures</value>
</input>
</generator>
</input>
<input into="password">
<value>tiaspbiqe2r</value>
</input>
<input into="super_user">
<value>true</value>
</input>
</generator>
</input>
<!--Create the users-->
<utility module_path=".*/parameterised_accounts">
<input into="accounts">
<datastore>accounts</datastore>
</input>
</utility>
<vulnerability module_path=".*/forensic_trash_deleted_files">
<input into="account">
<datastore>accounts</datastore>
</input>
</vulnerability>
<network type="private_network" range="dhcp"/>
</system>
</scenario>