forked from gauntlt/gauntlt-docker
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #1 from millaguie/upgradeSomeStuff
Upgrade some stuff
- Loading branch information
Showing
12 changed files
with
263 additions
and
34 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
@slow | ||
Feature: Run dirb scan on a URL | ||
|
||
Scenario: Use dirb to scan a website for basic security requirements and the DIRB_WORDLISTS environment variable must be set in your path. You can use different wordlists by changing the environment variable. | ||
Given "dirb" is installed | ||
And the following profile: | ||
| name | value | | ||
| hostname | http://scanme.nmap.org | | ||
| dirb_wordlists_path | Overwritten by $DIRB_WORDLISTS | | ||
| wordlist | vulns/tests.txt | | ||
When I launch a "dirb" attack with: | ||
""" | ||
dirb <hostname> <dirb_wordlists_path>/<wordlist> -wf | ||
""" | ||
Then the output should contain: | ||
""" | ||
FOUND: 0 | ||
""" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
Feature: Run garmr scan on a URL | ||
|
||
Scenario: Use Garmr to scan a website for the Mozilla opioniated security requirements | ||
Given "garmr" is installed | ||
And the following profile: | ||
| name | value | | ||
| target_url | http://scanme.nmap.org | | ||
When I launch a "garmr" attack with: | ||
""" | ||
garmr -u <target_url> -o my_garmr_output.xml | ||
""" | ||
Then it should pass with: | ||
""" | ||
[Garmr.corechecks.Http200Check] Pass The request returned an HTTP 200 response. | ||
""" | ||
And the file "my_garmr_output.xml" should not contain XML: | ||
| css | | ||
| testcase[name="Http200Check"] failure | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
@slow | ||
Feature: Test for the Heartbleed vulnerability | ||
|
||
Scenario: Test my website for the Heartbleed vulnerability (see heartbleed.com for more info) | ||
|
||
Given "Heartbleed" is installed | ||
And the following profile: | ||
| name | value | | ||
| domain | www.google.com | | ||
When I launch a "Heartbleed" attack with: | ||
""" | ||
Heartbleed <domain>:443 | ||
""" | ||
Then the output should contain "SAFE" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
@slow | ||
|
||
Feature: nmap attacks for scanme.nmap.org and to use this for your tests, change the value in the profile | ||
Background: | ||
Given "nmap" is installed | ||
And the following profile: | ||
| name | value | | ||
| hostname | scanme.nmap.org | | ||
| host | scanme.nmap.org | | ||
| tcp_ping_ports | 22,25,80,443 | | ||
|
||
Scenario: Verify server is open on expected set of ports using the nmap-fast attack step | ||
When I launch a "nmap-fast" attack | ||
Then the output should match /80.tcp\s+open/ | ||
|
||
Scenario: Verify server is open on expected set of ports using the nmap fast flag | ||
When I launch an "nmap" attack with: | ||
""" | ||
nmap -F <hostname> | ||
""" | ||
Then the output should match: | ||
""" | ||
80/tcp\s+open | ||
""" | ||
|
||
Scenario: Verify that there are no unexpected ports open | ||
When I launch an "nmap" attack with: | ||
""" | ||
nmap -F <hostname> | ||
""" | ||
Then the output should not contain: | ||
""" | ||
22/tcp | ||
25/tcp | ||
""" | ||
|
||
Scenario: Output to XML | ||
When I launch an "nmap" attack with: | ||
""" | ||
nmap -p 80,443 -oX foo.xml <hostname> | ||
""" | ||
And the file "foo.xml" should contain XML: | ||
| css | | ||
| ports port[protocol="tcp"][portid="80"] state[state="open"] | | ||
And the file "foo.xml" should not contain XML: | ||
| css | | ||
| ports port[protocol="tcp"][portid="123"] state[state="open"] | | ||
| ports port[protocol="tcp"][portid="443"] state[state="open"] | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
@slow | ||
|
||
Feature: Run sqlmap against a target | ||
|
||
Scenario: Identify SQL injection vulnerabilities | ||
Given "sqlmap" is installed | ||
And the following profile: | ||
| name | value | | ||
| target_url | http://scanme.nmap.org/?id=test | | ||
When I launch a "sqlmap" attack with: | ||
""" | ||
python <sqlmap_path> -u <target_url> --dbms sqlite --batch -v 0 --tables | ||
""" | ||
Then the output should contain "all tested parameters do not appear to be injectable" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
Feature: Run sslyze against a target | ||
|
||
Background: | ||
Given "sslyze" is installed | ||
And the following profile: | ||
| name | value | | ||
| hostname | google.com | | ||
|
||
Scenario: Ensure no anonymous certificates | ||
When I launch an "sslyze" attack with: | ||
""" | ||
python <sslyze_path> <hostname>:443 | ||
""" | ||
Then the output should not contain: | ||
""" | ||
Anon | ||
""" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
@slow | ||
Feature: Evaluate responses to various HTTP methods. | ||
|
||
Background: | ||
Given "curl" is installed | ||
And the following profile: | ||
| name | value | | ||
| hostname | scanme.nmap.org | | ||
|
||
Scenario Outline: Verify server responds correctly to various HTTP methods | ||
When I launch a "curl" attack with: | ||
""" | ||
curl -i -X <method> <hostname> | ||
""" | ||
Then the output should contain "<response>" | ||
Examples: | ||
| method | response | | ||
| delete | HTTP/1.1 501 Not Implemented | | ||
| patch | HTTP/1.1 501 Not Implemented | | ||
| trace | HTTP/1.1 501 Not Implemented | | ||
| track | HTTP/1.1 501 Not Implemented | | ||
| bogus | HTTP/1.1 501 Not Implemented | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
@reallyslow | ||
Feature: Look for common vulnerabilities using owasp-zap | ||
|
||
# Adapted from https://github.com/devopstf/gauntlt-zap/blob/master/attacks/xss/zap-xss.attack | ||
Background: | ||
Given the following profile: | ||
| name | value | | ||
| url | http://scanme.nmap.org | | ||
|
||
Scenario: Using owasp-zap, look for common vulnerabilities via passive scan | ||
When I launch a "generic" attack with: | ||
""" | ||
zap-cli quick-scan -sc -o "-config api.disablekey=true --self-contained -config scanner.attackOnStart=true -config view.mode=attack -config connection.dnsTtlSuccessfulQueries=-1 -config api.addrs.addr.name=.* -config api.addrs.addr.regex=true" -s xss,sqli --spider --recursive <url> | ||
""" | ||
Then the output should contain "Issues found: 0" |
Binary file not shown.