Created
March 29, 2016 18:03
-
-
Save Aviio/97b247e919404e49a8c5c10942446562 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<systems> | |
<!-- an example remote storage system, with a remotely exploitable vulnerability that can then be escalated to root --> | |
<system id="storageserver" os="linux" basebox="debian-puppet-64" url="" > | |
<vulnerabilities> | |
<vulnerability privilege="" access="" type="misc" cve=""></vulnerability> | |
</vulnerabilities> | |
<!-- secure services will be provided, if matching insecure ones have not been selected --> | |
<services> | |
</services>--> | |
<networks> | |
<network name="homeonly"></network> | |
</networks> | |
</system> | |
<!-- an example remote web server, with a remotely exploitable root vulnerability --> | |
<!-- This never worked.--> | |
<!--<system id="webserver" os="linux" basebox="puppettest" url="" > | |
<vulnerabilities> | |
<vulnerability privilege="root" access="remote" type="www" cve=""></vulnerability> | |
</vulnerabilities> | |
<networks> | |
<misc name="homeonly"></misc> | |
</networks> | |
</system> --> | |
</systems> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment