reorganize some things in this repo

This commit is contained in:
kenna-bmcdevitt 2020-10-27 02:30:09 -05:00
parent f2bdcf4779
commit f69712b823
49 changed files with 916379 additions and 1 deletions

View file

@ -6,3 +6,5 @@
- **koans** - ruby koans.
- **modules** - modules to hold various namespaces to more efficiently organize code.
- **programming_books** - excercises and examples from ruby programming books.
- **security_tools** - programs that can be associated with security.
- **testing_things** - programs that are not complete but ones I use to experiment and test things with.

View file

@ -0,0 +1,25 @@
{
"skip_autoclose": true,
"assets": [
{
"ip_address": "99.45.63.6",
"vulns": [
{
"scanner_identifier": "S9207753E",
"scanner_type": "KDI Faker Data",
"created_at": "2020-04-29 15:29:18",
"last_seen_at": "2020-04-29 15:29:18",
"status": "open"
}
]
}
],
"vuln_defs": [
{
"scanner_identifier": "S9207753E",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2018-0661",
"name": "CVE-2018-0661"
}
]
}

View file

@ -27,7 +27,7 @@ class CveReport
end
def from_file
Zlib::GzipReader.open(filename) do |gz|
::Zlib::GzipReader.open(filename) do |gz|
JSON.parse(gz.read)
end
end

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,25 @@
{
"skip_autoclose": true,
"assets": [
{
"ip_address": "253.151.121.58",
"vulns": [
{
"scanner_identifier": "S5598672Z",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:16",
"last_seen_at": "2019-10-21 10:14:16",
"status": "open"
}
]
}
],
"vuln_defs": [
{
"scanner_identifier": "S5598672Z",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2009-0168",
"name": "CVE-2009-0168"
}
]
}

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,69 @@
{
"skip_autoclose": true,
"assets": [
{
"ip_address": "242.91.166.234",
"vulns": [
{
"scanner_identifier": "S6193196A",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:24",
"last_seen_at": "2019-10-21 10:14:24",
"status": "open"
},
{
"scanner_identifier": "S7104785G",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:24",
"last_seen_at": "2019-10-21 10:14:24",
"status": "open"
}
]
},
{
"ip_address": "84.44.194.64",
"vulns": [
{
"scanner_identifier": "S6158307F",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:24",
"last_seen_at": "2019-10-21 10:14:24",
"status": "open"
},
{
"scanner_identifier": "S8154624Z",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:24",
"last_seen_at": "2019-10-21 10:14:24",
"status": "open"
}
]
}
],
"vuln_defs": [
{
"scanner_identifier": "S6193196A",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2019-5284",
"name": "CVE-2019-5284"
},
{
"scanner_identifier": "S7104785G",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2014-9275",
"name": "CVE-2014-9275"
},
{
"scanner_identifier": "S6158307F",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2001-1527",
"name": "CVE-2001-1527"
},
{
"scanner_identifier": "S8154624Z",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2007-5409",
"name": "CVE-2007-5409"
}
]
}

View file

@ -0,0 +1,139 @@
{
"skip_autoclose": true,
"assets": [
{
"ip_address": "110.30.83.241",
"vulns": [
{
"scanner_identifier": "S8972724C",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
},
{
"scanner_identifier": "S8891522D",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
},
{
"scanner_identifier": "S6632609H",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
}
]
},
{
"ip_address": "221.4.62.144",
"vulns": [
{
"scanner_identifier": "S8050694E",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
},
{
"scanner_identifier": "S6500311B",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
},
{
"scanner_identifier": "S9091412Z",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
}
]
},
{
"ip_address": "203.77.87.246",
"vulns": [
{
"scanner_identifier": "S6029370H",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
},
{
"scanner_identifier": "S8933594I",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
},
{
"scanner_identifier": "S6384884J",
"scanner_type": "KDI Faker Data",
"created_at": "2019-10-21 10:14:33",
"last_seen_at": "2019-10-21 10:14:33",
"status": "open"
}
]
}
],
"vuln_defs": [
{
"scanner_identifier": "S8972724C",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2014-4335",
"name": "CVE-2014-4335"
},
{
"scanner_identifier": "S8891522D",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2018-17337",
"name": "CVE-2018-17337"
},
{
"scanner_identifier": "S6632609H",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2008-1059",
"name": "CVE-2008-1059"
},
{
"scanner_identifier": "S8050694E",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2009-4304",
"name": "CVE-2009-4304"
},
{
"scanner_identifier": "S6500311B",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2015-4605",
"name": "CVE-2015-4605"
},
{
"scanner_identifier": "S9091412Z",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2005-1364",
"name": "CVE-2005-1364"
},
{
"scanner_identifier": "S6029370H",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2013-4471",
"name": "CVE-2013-4471"
},
{
"scanner_identifier": "S8933594I",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2011-0134",
"name": "CVE-2011-0134"
},
{
"scanner_identifier": "S6384884J",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2018-6690",
"name": "CVE-2018-6690"
}
]
}

View file

@ -0,0 +1,34 @@
{
"skip_autoclose": true,
"assets": [
{
"ip_address": "42.12.166.72",
"vulns": [
{
"scanner_identifier": "S9167228F",
"scanner_type": "KDI Faker Data",
"created_at": "2019-08-16 16:33:20",
"last_seen_at": "2019-08-16 16:33:20",
"status": "open",
"port": 665
},
{
"scanner_identifier": "S9167228F",
"scanner_type": "KDI Faker Data",
"created_at": "2019-08-16 16:33:20",
"last_seen_at": "2019-08-16 16:33:20",
"status": "open",
"port": 666
}
]
}
],
"vuln_defs": [
{
"scanner_identifier": "S9167228F",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2007-0845",
"name": "CVE-2007-0845"
}
]
}

View file

@ -1,4 +1,6 @@
require './cve_report'
require 'zlib'
require 'json'
module KennaKdi
class GenerateCveIdsJson

View file

@ -0,0 +1,25 @@
{
"skip_autoclose": true,
"assets": [
{
"ip_address": "243.205.78.181",
"vulns": [
{
"scanner_identifier": "S7943578C",
"scanner_type": "KDI Faker Data",
"created_at": "2020-06-10 18:17:02",
"last_seen_at": "2020-06-10 18:17:02",
"status": "open"
}
]
}
],
"vuln_defs": [
{
"scanner_identifier": "S7943578C",
"scanner_type": "KDI Faker Data",
"cve_identifiers": "CVE-2014-1353",
"name": "CVE-2014-1353"
}
]
}

File diff suppressed because it is too large Load diff

View file

@ -14,6 +14,7 @@ OptionParser.new do |opts|
opts.on('-a NUM', '--assets', Integer, "Number of assets to create") { |a| params[:assets] = a }
opts.on('-v NUM', '--vulns', Integer, "Number of vulns that may be created per asset") {|v| params[:vulns] = v }
# opts.on('-g BOOLEAN', '--generate', Boolean, "Generate a new json of cve ids in an array") {|g| params[:generate] = g }
opts.on_tail("-h", "--help", "Show this message") do
puts opts

View file

@ -0,0 +1,35 @@
{
"skip_autoclose": true,
"assets": [
{
"hostname": "floop.com",
"url": "https://floop.com/resource/doop",
"fqdn": "big.compute.floop.com",
"external_id": "bleepbloopvulnhere",
"tags": [
"Risks: External, PHI"
],
"priority": 10,
"vulns": [
{
"scanner_identifier" : "ticket 13443 test",
"scanner_type": "SamBSecure_KDI",
"scanner_score" : 2,
"created_at" : "20191220T223746,289-0800",
"last_seen_at" : "20200323T105036,448-0700",
"last_fixed_on" : "20200323T105034,228-0700",
"status" : "open"
}
]
}
],
"vuln_defs": [
{
"scanner_identifier" : "ticket 13443 test",
"scanner_type": "SamBSecure_KDI",
"name" : "Auditing for SQL database should be set to On",
"description" : "Database events are tracked by the Auditing feature and the events are written to an audit log in your Azure storage account. This process helps you to monitor database activity, and get insight into anomalies that could indicate business concerns or suspected security violations.",
"solution" : "1. Log in to Azure Portal.\n2. Go to SQL database.\n3. For each DB instance, click on Auditing & Threat Detection\n4. Set Auditing to On\n5. Click Save"
}
]
}