bmt 0.2.0 → 0.3.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/bmt/step.rb +3 -2
- data/lib/bmt/version.rb +1 -1
- data/lib/data/0.1/methodologies/template.json +14 -0
- data/lib/data/0.1/methodologies/website_testing.json +23 -0
- data/lib/data/0.1/schema.json +5 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 04a87568e5dfa59d4a18684155a94887ee5269d1c21616385ce597a61a02ed98
|
4
|
+
data.tar.gz: d7b6fc9115319bb9c2e81b2365142cb74f1c1da96464c29ea9e996c5e59e41e0
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 59f5897bffa150a4d9aa10a833e63f1976220f8a8de160593586abd2cf19c0bc06fc9ec7fcb93838a0ef84a2786d34638d2681e4172fadfcadca834cb87c303e
|
7
|
+
data.tar.gz: e320d79c9bb6f845f34843b73d3ae08739db6339b3beb68e179a16dbc38d5bb189c7423cd927027b057902f99335888e7a3e479b5dd7bb4e8b0f702ba99c6e97
|
data/lib/bmt/step.rb
CHANGED
@@ -1,13 +1,14 @@
|
|
1
1
|
module BMT
|
2
2
|
class Step
|
3
|
-
attr_reader :key, :title, :description, :methodology
|
3
|
+
attr_reader :key, :title, :description, :methodology, :type
|
4
4
|
|
5
5
|
def initialize(methodology:, attributes:)
|
6
6
|
@methodology = methodology
|
7
7
|
@key = attributes['key']
|
8
8
|
@title = attributes['title']
|
9
9
|
@description = attributes['description']
|
10
|
-
@
|
10
|
+
@type = attributes['type']
|
11
|
+
@items_data = attributes['items'] || []
|
11
12
|
end
|
12
13
|
|
13
14
|
def items
|
data/lib/bmt/version.rb
CHANGED
@@ -11,6 +11,7 @@
|
|
11
11
|
"key": "koala",
|
12
12
|
"title": "Check that you have a Koala",
|
13
13
|
"description": "# Does it look like one?\nIt is easy to find out.\n",
|
14
|
+
"type": "checklist",
|
14
15
|
"items": [
|
15
16
|
{
|
16
17
|
"key": "marsupial",
|
@@ -40,6 +41,7 @@
|
|
40
41
|
"key": "kangaroo",
|
41
42
|
"title": "Ensure you have a kangaroo",
|
42
43
|
"description": "Does it look like one?",
|
44
|
+
"type": "checklist",
|
43
45
|
"items": [
|
44
46
|
{
|
45
47
|
"key": "marsupial",
|
@@ -63,6 +65,18 @@
|
|
63
65
|
"tools": "Field, Trampoline"
|
64
66
|
}
|
65
67
|
]
|
68
|
+
},
|
69
|
+
{
|
70
|
+
"key": "upload_logs",
|
71
|
+
"title": "Upload logs",
|
72
|
+
"description": "This should include all associated traffic associated to the in-scope targets.",
|
73
|
+
"type": "large_upload"
|
74
|
+
},
|
75
|
+
{
|
76
|
+
"key": "executive_summary",
|
77
|
+
"title": "Executive summary",
|
78
|
+
"description": "The executive summary should be written with a high-level view of both risk and business impact. It should be concise and clear, therefore it is important to use plain English. This ensures that non-technical readers can gain insight into security concerns outlined in your report.",
|
79
|
+
"type": "executive_summary"
|
66
80
|
}
|
67
81
|
]
|
68
82
|
}
|
@@ -11,6 +11,7 @@
|
|
11
11
|
"key": "information",
|
12
12
|
"title": "Information gathering",
|
13
13
|
"description": "",
|
14
|
+
"type": "checklist",
|
14
15
|
"items": [
|
15
16
|
{
|
16
17
|
"key": "search_engine_discovery_and_reconnaissance",
|
@@ -91,6 +92,7 @@
|
|
91
92
|
"key": "config_and_deploy_management",
|
92
93
|
"title": "Configuration and Deploy Management Testing",
|
93
94
|
"description": "",
|
95
|
+
"type": "checklist",
|
94
96
|
"items": [
|
95
97
|
{
|
96
98
|
"key": "network_and_infrastructure",
|
@@ -161,6 +163,7 @@
|
|
161
163
|
"key": "identity_management",
|
162
164
|
"title": "Identity Management Testing",
|
163
165
|
"description": "",
|
166
|
+
"type": "checklist",
|
164
167
|
"items": [
|
165
168
|
{
|
166
169
|
"key": "role_definition",
|
@@ -223,6 +226,7 @@
|
|
223
226
|
"key": "authentication",
|
224
227
|
"title": "Authentication Testing",
|
225
228
|
"description": "",
|
229
|
+
"type": "checklist",
|
226
230
|
"items": [
|
227
231
|
{
|
228
232
|
"key": "encrypted_credentials",
|
@@ -309,6 +313,7 @@
|
|
309
313
|
"key": "authorization",
|
310
314
|
"title": "Authorization Testing",
|
311
315
|
"description": "",
|
316
|
+
"type": "checklist",
|
312
317
|
"items": [
|
313
318
|
{
|
314
319
|
"key": "directory_traversal_and_file_include",
|
@@ -348,6 +353,7 @@
|
|
348
353
|
"key": "session_management",
|
349
354
|
"title": "Session Management Testing",
|
350
355
|
"description": "",
|
356
|
+
"type": "checklist",
|
351
357
|
"items": [
|
352
358
|
{
|
353
359
|
"key": "bypass_schema",
|
@@ -419,6 +425,7 @@
|
|
419
425
|
"key": "data_validation",
|
420
426
|
"title": "Data Validation Testing",
|
421
427
|
"description": "",
|
428
|
+
"type": "checklist",
|
422
429
|
"items": [
|
423
430
|
{
|
424
431
|
"key": "reflected_xss",
|
@@ -630,6 +637,7 @@
|
|
630
637
|
"key": "error_handling",
|
631
638
|
"title": "Error handling",
|
632
639
|
"description": "",
|
640
|
+
"type": "checklist",
|
633
641
|
"items": [
|
634
642
|
{
|
635
643
|
"key": "error_codes",
|
@@ -653,6 +661,7 @@
|
|
653
661
|
"key": "cryptography",
|
654
662
|
"title": "Cryptography",
|
655
663
|
"description": "",
|
664
|
+
"type": "checklist",
|
656
665
|
"items": [
|
657
666
|
{
|
658
667
|
"key": "transport_layer_protection",
|
@@ -684,6 +693,7 @@
|
|
684
693
|
"key": "business_logic",
|
685
694
|
"title": "Business Logic Testing",
|
686
695
|
"description": "",
|
696
|
+
"type": "checklist",
|
687
697
|
"items": [
|
688
698
|
{
|
689
699
|
"key": "data_validation",
|
@@ -761,6 +771,7 @@
|
|
761
771
|
"key": "client_side",
|
762
772
|
"title": "Client Side Testing",
|
763
773
|
"description": "",
|
774
|
+
"type": "checklist",
|
764
775
|
"items": [
|
765
776
|
{
|
766
777
|
"key": "dom_based_xss",
|
@@ -857,6 +868,18 @@
|
|
857
868
|
"tools": "Chrome, Firebug, Burp Proxy, ZAP"
|
858
869
|
}
|
859
870
|
]
|
871
|
+
},
|
872
|
+
{
|
873
|
+
"key": "upload_logs",
|
874
|
+
"title": "Upload logs",
|
875
|
+
"description": "This should include all associated traffic associated to the in-scope targets.",
|
876
|
+
"type": "large_upload"
|
877
|
+
},
|
878
|
+
{
|
879
|
+
"key": "executive_summary",
|
880
|
+
"title": "Executive summary",
|
881
|
+
"description": "The executive summary should be written with a high-level view of both risk and business impact. It should be concise and clear, therefore it is important to use plain English. This ensures that non-technical readers can gain insight into security concerns outlined in your report.",
|
882
|
+
"type": "executive_summary"
|
860
883
|
}
|
861
884
|
]
|
862
885
|
}
|
data/lib/data/0.1/schema.json
CHANGED
@@ -78,6 +78,10 @@
|
|
78
78
|
"description": {
|
79
79
|
"type": "string"
|
80
80
|
},
|
81
|
+
"type": {
|
82
|
+
"type": "string",
|
83
|
+
"enum": ["checklist", "large_upload", "executive_summary"]
|
84
|
+
},
|
81
85
|
"items": {
|
82
86
|
"type": "array",
|
83
87
|
"items": {
|
@@ -89,7 +93,7 @@
|
|
89
93
|
"key",
|
90
94
|
"title",
|
91
95
|
"description",
|
92
|
-
"
|
96
|
+
"type"
|
93
97
|
]
|
94
98
|
}
|
95
99
|
},
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: bmt
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.3.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Federico Tagliabue
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-12-13 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: bundler
|