pwn 0.4.405 → 0.4.409
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.ruby-version +1 -1
- data/Gemfile +4 -4
- data/README.md +5 -5
- data/Vagrantfile +3 -3
- data/bin/pwn_fuzz_net_app_proto +1 -1
- data/bin/pwn_sast +1 -1
- data/lib/pwn/plugins/metasploit.rb +2 -2
- data/lib/pwn/sast/amqp_connect_as_guest.rb +1 -1
- data/lib/pwn/sast/apache_file_system_util_api.rb +1 -1
- data/lib/pwn/sast/aws.rb +1 -1
- data/lib/pwn/sast/banned_function_calls_c.rb +1 -1
- data/lib/pwn/sast/base64.rb +1 -1
- data/lib/pwn/sast/beef_hook.rb +1 -1
- data/lib/pwn/sast/cmd_execution_java.rb +1 -1
- data/lib/pwn/sast/cmd_execution_python.rb +1 -1
- data/lib/pwn/sast/cmd_execution_ruby.rb +1 -1
- data/lib/pwn/sast/cmd_execution_scala.rb +1 -1
- data/lib/pwn/sast/csrf.rb +1 -1
- data/lib/pwn/sast/deserial_java.rb +1 -1
- data/lib/pwn/sast/emoticon.rb +1 -1
- data/lib/pwn/sast/eval.rb +1 -1
- data/lib/pwn/sast/factory.rb +1 -1
- data/lib/pwn/sast/file_permission.rb +1 -1
- data/lib/pwn/sast/http_authorization_header.rb +1 -1
- data/lib/pwn/sast/inner_html.rb +1 -1
- data/lib/pwn/sast/keystore.rb +1 -1
- data/lib/pwn/sast/location_hash.rb +1 -1
- data/lib/pwn/sast/log4j.rb +1 -1
- data/lib/pwn/sast/logger.rb +1 -1
- data/lib/pwn/sast/outer_html.rb +1 -1
- data/lib/pwn/sast/password.rb +1 -1
- data/lib/pwn/sast/pom_version.rb +1 -1
- data/lib/pwn/sast/port.rb +1 -1
- data/lib/pwn/sast/private_key.rb +1 -1
- data/lib/pwn/sast/redirect.rb +1 -1
- data/lib/pwn/sast/redos.rb +1 -1
- data/lib/pwn/sast/shell.rb +1 -1
- data/lib/pwn/sast/sql.rb +1 -1
- data/lib/pwn/sast/ssl.rb +1 -1
- data/lib/pwn/sast/sudo.rb +1 -1
- data/lib/pwn/sast/task_tag.rb +1 -1
- data/lib/pwn/sast/throw_errors.rb +1 -1
- data/lib/pwn/sast/token.rb +1 -1
- data/lib/pwn/sast/version.rb +1 -1
- data/lib/pwn/sast/window_location_hash.rb +1 -1
- data/lib/pwn/version.rb +1 -1
- data/packer/daemons/msfrpcd.rb +3 -3
- data/packer/kali_rolling_aws_ami.json +3 -3
- data/packer/kali_rolling_qemu_kvm.json +2 -2
- data/packer/kali_rolling_virtualbox.json +4 -4
- data/packer/kali_rolling_vmware.json +3 -3
- data/packer/provisioners/metasploit.rb +3 -3
- data/packer/provisioners/upload_globals.sh +1 -1
- data/vagrant/provisioners/burpsuite_pro.rb +3 -3
- data/vagrant/provisioners/jenkins_ssh-keygen.rb +3 -3
- data/vagrant/provisioners/kali_customize.rb +2 -2
- data/vagrant/provisioners/letsencrypt.rb +3 -3
- data/vagrant/provisioners/update_jenkins_plugins.rb +3 -3
- data/vagrant/provisioners/upload_globals.sh +1 -1
- metadata +12 -12
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: ae2da360fbd77bfb132cdb2def27d6706b6480cee191c54168dda853d4bf923f
|
|
4
|
+
data.tar.gz: 0e662e6d0d99a9de2d80ae0ba05b837e9f2beb56a91e958964173d59feab3fb3
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 94d95a31df6cdb1d2d154f1869ad92f95fc7e8ba916bed4f9567ca7949798745c57ace2b55f5aff3b2063fb13556d5d05ee2a01da22afdf0ca5c5a2c9d0d3191
|
|
7
|
+
data.tar.gz: 50f9edd9f5aa97c20da131c97b142371818c5db2b10e7bd67bdf8c943a32dfa9b13e7dc037ecf1c9fdc6ec71e464c24369523742a4d3b69eb2ed9563d683915a
|
data/.ruby-version
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
3.1.
|
|
1
|
+
3.1.2
|
data/Gemfile
CHANGED
|
@@ -17,8 +17,8 @@ gem 'authy', '3.0.0'
|
|
|
17
17
|
gem 'aws-sdk', '3.1.0'
|
|
18
18
|
gem 'bettercap', '1.6.2'
|
|
19
19
|
gem 'brakeman', '5.2.2'
|
|
20
|
-
gem 'bson', '4.
|
|
21
|
-
gem 'bundler', '>=2.3.
|
|
20
|
+
gem 'bson', '4.15.0'
|
|
21
|
+
gem 'bundler', '>=2.3.12'
|
|
22
22
|
gem 'bundler-audit', '0.9.0.1'
|
|
23
23
|
gem 'bunny', '2.19.0'
|
|
24
24
|
gem 'colorize', '0.8.1'
|
|
@@ -58,9 +58,9 @@ gem 'rex', '2.0.13'
|
|
|
58
58
|
gem 'rmagick', '4.2.5'
|
|
59
59
|
gem 'rspec', '3.11.0'
|
|
60
60
|
gem 'rtesseract', '3.1.2'
|
|
61
|
-
gem 'rubocop', '1.
|
|
61
|
+
gem 'rubocop', '1.28.1'
|
|
62
62
|
gem 'rubocop-rake', '0.6.0'
|
|
63
|
-
gem 'rubocop-rspec', '2.
|
|
63
|
+
gem 'rubocop-rspec', '2.10.0'
|
|
64
64
|
gem 'ruby-audio', '1.6.1'
|
|
65
65
|
gem 'ruby-nmap', '0.10.0'
|
|
66
66
|
gem 'ruby-saml', '1.14.0'
|
data/README.md
CHANGED
|
@@ -31,13 +31,13 @@ Leveraging various pre-built modules and the pwn prototyper, you can mix-and-mat
|
|
|
31
31
|
Tested on Linux, & OSX leveraging Ruby via RVM.
|
|
32
32
|
|
|
33
33
|
```
|
|
34
|
-
$ rvm use ruby-3.1.
|
|
34
|
+
$ rvm use ruby-3.1.2@global
|
|
35
35
|
$ rvm gemset create pwn
|
|
36
|
-
$ rvm use ruby-3.1.
|
|
36
|
+
$ rvm use ruby-3.1.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
|
38
38
|
$ gem install --verbose pwn
|
|
39
39
|
$ pwn
|
|
40
|
-
pwn[v0.4.
|
|
40
|
+
pwn[v0.4.409]:001 >>> PWN.help
|
|
41
41
|
```
|
|
42
42
|
|
|
43
43
|
[](https://youtu.be/G7iLUY4FzsI)
|
|
@@ -48,11 +48,11 @@ pwn[v0.4.405]:001 >>> PWN.help
|
|
|
48
48
|
It's wise to update pwn often as numerous versions are released/week:
|
|
49
49
|
```
|
|
50
50
|
$ rvm list gemsets
|
|
51
|
-
$ rvm use ruby-3.1.
|
|
51
|
+
$ rvm use ruby-3.1.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
|
53
53
|
$ gem install --verbose pwn
|
|
54
54
|
$ pwn
|
|
55
|
-
pwn[v0.4.
|
|
55
|
+
pwn[v0.4.409]:001 >>> PWN.help
|
|
56
56
|
```
|
|
57
57
|
|
|
58
58
|
|
data/Vagrantfile
CHANGED
|
@@ -7,13 +7,13 @@ require 'pathname'
|
|
|
7
7
|
|
|
8
8
|
API_VERSION = '2'
|
|
9
9
|
pwn_root = Pathname.new(__FILE__).realpath.expand_path.parent
|
|
10
|
-
vagrant_gui = ENV
|
|
11
|
-
pwn_provider = ENV
|
|
10
|
+
vagrant_gui = ENV.fetch('VAGRANT_GUI') if ENV.fetch('VAGRANT_GUI')
|
|
11
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
12
12
|
runtime_userland = 'vagrant_rsync_userland_configs.lst'
|
|
13
13
|
template_userland = "#{pwn_root}/vagrant_rsync_userland_template.lst"
|
|
14
14
|
|
|
15
15
|
if pwn_provider == 'docker'
|
|
16
|
-
docker_container_target = ENV
|
|
16
|
+
docker_container_target = ENV.fetch('DOCKER_CONTAINER_TARGET') if ENV.fetch('DOCKER_CONTAINER_TARGET')
|
|
17
17
|
docker_create_args = [
|
|
18
18
|
'--interactive',
|
|
19
19
|
'--tty'
|
data/bin/pwn_fuzz_net_app_proto
CHANGED
data/bin/pwn_sast
CHANGED
|
@@ -17,8 +17,8 @@ module PWN
|
|
|
17
17
|
if opts[:yaml_conf] && File.exist?(opts[:yaml_conf])
|
|
18
18
|
yaml_conf = YAML.load_file(opts[:yaml_conf].to_s.strip.chomp.scrub)
|
|
19
19
|
else
|
|
20
|
-
pwn_root = ENV
|
|
21
|
-
pwn_provider = ENV
|
|
20
|
+
pwn_root = ENV.fetch('PWN_ROOT') if ENV.fetch('PWN_ROOT')
|
|
21
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
22
22
|
yaml_conf = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/metasploit/vagrant.yaml")
|
|
23
23
|
end
|
|
24
24
|
|
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'ACCOUNT MANAGEMENT',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-2'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
|
@@ -108,7 +108,7 @@ module PWN
|
|
|
108
108
|
{
|
|
109
109
|
sast_module: self,
|
|
110
110
|
section: 'INFORMATION INPUT VALIDATION',
|
|
111
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
111
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
112
112
|
}
|
|
113
113
|
end
|
|
114
114
|
|
data/lib/pwn/sast/aws.rb
CHANGED
|
@@ -111,7 +111,7 @@ module PWN
|
|
|
111
111
|
{
|
|
112
112
|
sast_module: self,
|
|
113
113
|
section: 'TRANSMISSION CONFIDENTIALITY AND INTEGRITY',
|
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-8'
|
|
115
115
|
}
|
|
116
116
|
rescue StandardError => e
|
|
117
117
|
raise e
|
|
@@ -236,7 +236,7 @@ module PWN
|
|
|
236
236
|
{
|
|
237
237
|
sast_module: self,
|
|
238
238
|
section: 'INFORMATION INPUT VALIDATION',
|
|
239
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
239
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
240
240
|
}
|
|
241
241
|
end
|
|
242
242
|
|
data/lib/pwn/sast/base64.rb
CHANGED
|
@@ -112,7 +112,7 @@ module PWN
|
|
|
112
112
|
{
|
|
113
113
|
sast_module: self,
|
|
114
114
|
section: 'PROTECTION OF INFORMATION AT REST',
|
|
115
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
115
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
|
|
116
116
|
}
|
|
117
117
|
rescue StandardError => e
|
|
118
118
|
raise e
|
data/lib/pwn/sast/beef_hook.rb
CHANGED
|
@@ -106,7 +106,7 @@ module PWN
|
|
|
106
106
|
{
|
|
107
107
|
sast_module: self,
|
|
108
108
|
section: 'MALICIOUS CODE PROTECTION',
|
|
109
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
109
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
|
|
110
110
|
}
|
|
111
111
|
rescue StandardError => e
|
|
112
112
|
raise e
|
|
@@ -111,7 +111,7 @@ module PWN
|
|
|
111
111
|
{
|
|
112
112
|
sast_module: self,
|
|
113
113
|
section: 'INFORMATION INPUT VALIDATION',
|
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
115
115
|
}
|
|
116
116
|
rescue StandardError => e
|
|
117
117
|
raise e
|
|
@@ -113,7 +113,7 @@ module PWN
|
|
|
113
113
|
{
|
|
114
114
|
sast_module: self,
|
|
115
115
|
section: 'INFORMATION INPUT VALIDATION',
|
|
116
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
116
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
117
117
|
}
|
|
118
118
|
rescue StandardError => e
|
|
119
119
|
raise e
|
|
@@ -121,7 +121,7 @@ module PWN
|
|
|
121
121
|
{
|
|
122
122
|
sast_module: self,
|
|
123
123
|
section: 'INFORMATION INPUT VALIDATION',
|
|
124
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
124
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
125
125
|
}
|
|
126
126
|
rescue StandardError => e
|
|
127
127
|
raise e
|
|
@@ -111,7 +111,7 @@ module PWN
|
|
|
111
111
|
{
|
|
112
112
|
sast_module: self,
|
|
113
113
|
section: 'INFORMATION INPUT VALIDATION',
|
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
115
115
|
}
|
|
116
116
|
rescue StandardError => e
|
|
117
117
|
raise e
|
data/lib/pwn/sast/csrf.rb
CHANGED
|
@@ -107,7 +107,7 @@ module PWN
|
|
|
107
107
|
{
|
|
108
108
|
sast_module: self,
|
|
109
109
|
section: 'MALICIOUS CODE PROTECTION',
|
|
110
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
110
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
|
|
111
111
|
}
|
|
112
112
|
end
|
|
113
113
|
|
|
@@ -106,7 +106,7 @@ module PWN
|
|
|
106
106
|
{
|
|
107
107
|
sast_module: self,
|
|
108
108
|
section: 'INFORMATION INPUT VALIDATION',
|
|
109
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
109
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
110
110
|
}
|
|
111
111
|
end
|
|
112
112
|
|
data/lib/pwn/sast/emoticon.rb
CHANGED
|
@@ -114,7 +114,7 @@ module PWN
|
|
|
114
114
|
{
|
|
115
115
|
sast_module: self,
|
|
116
116
|
section: 'LEAST PRIVILEGE',
|
|
117
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
117
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
|
|
118
118
|
}
|
|
119
119
|
rescue StandardError => e
|
|
120
120
|
raise e
|
data/lib/pwn/sast/eval.rb
CHANGED
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'MALICIOUS CODE PROTECTION',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
data/lib/pwn/sast/factory.rb
CHANGED
|
@@ -106,7 +106,7 @@ module PWN
|
|
|
106
106
|
{
|
|
107
107
|
sast_module: self,
|
|
108
108
|
section: 'DEVELOPER CONFIGURATION MANAGEMENT',
|
|
109
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
109
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SA-10'
|
|
110
110
|
}
|
|
111
111
|
end
|
|
112
112
|
|
|
@@ -111,7 +111,7 @@ module PWN
|
|
|
111
111
|
{
|
|
112
112
|
sast_module: self,
|
|
113
113
|
section: 'LEAST PRIVILEGE',
|
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
|
|
115
115
|
}
|
|
116
116
|
rescue StandardError => e
|
|
117
117
|
raise e
|
|
@@ -116,7 +116,7 @@ module PWN
|
|
|
116
116
|
{
|
|
117
117
|
sast_module: self,
|
|
118
118
|
section: 'PROTECTION OF INFORMATION AT REST',
|
|
119
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
119
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
|
|
120
120
|
}
|
|
121
121
|
end
|
|
122
122
|
|
data/lib/pwn/sast/inner_html.rb
CHANGED
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'MALICIOUS CODE PROTECTION',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
data/lib/pwn/sast/keystore.rb
CHANGED
|
@@ -106,7 +106,7 @@ module PWN
|
|
|
106
106
|
{
|
|
107
107
|
sast_module: self,
|
|
108
108
|
section: 'CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT',
|
|
109
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
109
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-12'
|
|
110
110
|
}
|
|
111
111
|
rescue StandardError => e
|
|
112
112
|
raise e.mesasge
|
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'MALICIOUS CODE PROTECTION',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
data/lib/pwn/sast/log4j.rb
CHANGED
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'DEVELOPER SECURITY AND PRIVACY ARCHITECTURE AND DESIGN',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SA-17'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
data/lib/pwn/sast/logger.rb
CHANGED
|
@@ -124,7 +124,7 @@ module PWN
|
|
|
124
124
|
{
|
|
125
125
|
sast_module: self,
|
|
126
126
|
section: 'PROTECTION OF INFORMATION AT REST',
|
|
127
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
127
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
|
|
128
128
|
}
|
|
129
129
|
rescue StandardError => e
|
|
130
130
|
raise e
|
data/lib/pwn/sast/outer_html.rb
CHANGED
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'MALICIOUS CODE PROTECTION',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
data/lib/pwn/sast/password.rb
CHANGED
|
@@ -111,7 +111,7 @@ module PWN
|
|
|
111
111
|
{
|
|
112
112
|
sast_module: self,
|
|
113
113
|
section: 'PROTECTION OF INFORMATION AT REST',
|
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
|
|
115
115
|
}
|
|
116
116
|
end
|
|
117
117
|
|
data/lib/pwn/sast/pom_version.rb
CHANGED
|
@@ -113,7 +113,7 @@ module PWN
|
|
|
113
113
|
{
|
|
114
114
|
sast_module: self,
|
|
115
115
|
section: 'VULNERABILITY SCANNING',
|
|
116
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
116
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=RA-5'
|
|
117
117
|
}
|
|
118
118
|
rescue StandardError => e
|
|
119
119
|
raise e
|
data/lib/pwn/sast/port.rb
CHANGED
|
@@ -116,7 +116,7 @@ module PWN
|
|
|
116
116
|
{
|
|
117
117
|
sast_module: self,
|
|
118
118
|
section: 'TRANSMISSION CONFIDENTIALITY AND INTEGRITY',
|
|
119
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
119
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-8'
|
|
120
120
|
}
|
|
121
121
|
rescue StandardError => e
|
|
122
122
|
raise e
|
data/lib/pwn/sast/private_key.rb
CHANGED
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'CRYPTOGRAPHIC MODULE AUTHENTICATION',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=IA-7'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
data/lib/pwn/sast/redirect.rb
CHANGED
|
@@ -111,7 +111,7 @@ module PWN
|
|
|
111
111
|
{
|
|
112
112
|
sast_module: self,
|
|
113
113
|
section: 'LEAST PRIVILEGE',
|
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
|
|
115
115
|
}
|
|
116
116
|
rescue StandardError => e
|
|
117
117
|
raise e
|
data/lib/pwn/sast/redos.rb
CHANGED
|
@@ -116,7 +116,7 @@ module PWN
|
|
|
116
116
|
{
|
|
117
117
|
sast_module: self,
|
|
118
118
|
section: 'PROTECTION OF INFORMATION AT REST',
|
|
119
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
119
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-28'
|
|
120
120
|
}
|
|
121
121
|
rescue StandardError => e
|
|
122
122
|
raise e
|
data/lib/pwn/sast/shell.rb
CHANGED
|
@@ -117,7 +117,7 @@ module PWN
|
|
|
117
117
|
{
|
|
118
118
|
sast_module: self,
|
|
119
119
|
section: 'DEVELOPER SECURITY AND PRIVACY ARCHITECTURE AND DESIGN',
|
|
120
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
120
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SA-17'
|
|
121
121
|
}
|
|
122
122
|
rescue StandardError => e
|
|
123
123
|
raise e
|
data/lib/pwn/sast/sql.rb
CHANGED
|
@@ -113,7 +113,7 @@ module PWN
|
|
|
113
113
|
{
|
|
114
114
|
sast_module: self,
|
|
115
115
|
section: 'INFORMATION INPUT VALIDATION',
|
|
116
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
116
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-10'
|
|
117
117
|
}
|
|
118
118
|
rescue StandardError => e
|
|
119
119
|
raise e
|
data/lib/pwn/sast/ssl.rb
CHANGED
|
@@ -106,7 +106,7 @@ module PWN
|
|
|
106
106
|
{
|
|
107
107
|
sast_module: self,
|
|
108
108
|
section: 'PUBLIC KEY INFRASTRUCTURE CERTIFICATES',
|
|
109
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
109
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SC-17'
|
|
110
110
|
}
|
|
111
111
|
rescue StandardError => e
|
|
112
112
|
raise e
|
data/lib/pwn/sast/sudo.rb
CHANGED
|
@@ -109,7 +109,7 @@ module PWN
|
|
|
109
109
|
{
|
|
110
110
|
sast_module: self,
|
|
111
111
|
section: 'LEAST PRIVILEGE',
|
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
|
|
113
113
|
}
|
|
114
114
|
rescue StandardError => e
|
|
115
115
|
raise e
|
data/lib/pwn/sast/task_tag.rb
CHANGED
|
@@ -123,7 +123,7 @@ module PWN
|
|
|
123
123
|
{
|
|
124
124
|
sast_module: self,
|
|
125
125
|
section: 'LEAST PRIVILEGE',
|
|
126
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
126
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=AC-6'
|
|
127
127
|
}
|
|
128
128
|
rescue StandardError => e
|
|
129
129
|
raise e
|
|
@@ -108,7 +108,7 @@ module PWN
|
|
|
108
108
|
{
|
|
109
109
|
sast_module: self,
|
|
110
110
|
section: 'ERROR HANDLING',
|
|
111
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
111
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-11'
|
|
112
112
|
}
|
|
113
113
|
rescue StandardError => e
|
|
114
114
|
raise e
|
data/lib/pwn/sast/token.rb
CHANGED
|
@@ -106,7 +106,7 @@ module PWN
|
|
|
106
106
|
{
|
|
107
107
|
sast_module: self,
|
|
108
108
|
section: 'CRYPTOGRAPHIC MODULE AUTHENTICATION',
|
|
109
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
109
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=IA-7'
|
|
110
110
|
}
|
|
111
111
|
rescue StandardError => e
|
|
112
112
|
raise e
|
data/lib/pwn/sast/version.rb
CHANGED
|
@@ -106,7 +106,7 @@ module PWN
|
|
|
106
106
|
{
|
|
107
107
|
sast_module: self,
|
|
108
108
|
section: 'VULNERABILITY SCANNING',
|
|
109
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
109
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=RA-5'
|
|
110
110
|
}
|
|
111
111
|
rescue StandardError => e
|
|
112
112
|
raise e
|
|
@@ -108,7 +108,7 @@ module PWN
|
|
|
108
108
|
{
|
|
109
109
|
sast_module: self,
|
|
110
110
|
section: 'MALICIOUS CODE PROTECTION',
|
|
111
|
-
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search
|
|
111
|
+
nist_800_53_uri: 'https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#/control/?version=5.1&number=SI-3'
|
|
112
112
|
}
|
|
113
113
|
rescue StandardError => e
|
|
114
114
|
raise e
|
data/lib/pwn/version.rb
CHANGED
data/packer/daemons/msfrpcd.rb
CHANGED
|
@@ -21,15 +21,15 @@ end
|
|
|
21
21
|
action = opts[:action].to_s.scrub.to_sym
|
|
22
22
|
|
|
23
23
|
def start
|
|
24
|
-
if ENV
|
|
25
|
-
pwn_root = ENV
|
|
24
|
+
if ENV.fetch('PWN_ROOT')
|
|
25
|
+
pwn_root = ENV.fetch('PWN_ROOT')
|
|
26
26
|
elsif Dir.exist?('/pwn')
|
|
27
27
|
pwn_root = '/pwn'
|
|
28
28
|
else
|
|
29
29
|
pwn_root = Dir.pwd
|
|
30
30
|
end
|
|
31
31
|
|
|
32
|
-
pwn_provider = ENV
|
|
32
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
33
33
|
metasploit_root = '/opt/metasploit-framework-dev'
|
|
34
34
|
|
|
35
35
|
msfrpcd_config = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/metasploit/vagrant.yaml")
|
|
@@ -32,7 +32,7 @@
|
|
|
32
32
|
{
|
|
33
33
|
"type": "shell",
|
|
34
34
|
"environment_vars": [
|
|
35
|
-
"PWN_ROOT
|
|
35
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
36
36
|
"PWN_PROVIDER=aws"
|
|
37
37
|
],
|
|
38
38
|
"scripts": [
|
|
@@ -52,7 +52,7 @@
|
|
|
52
52
|
"pause_before": "180s",
|
|
53
53
|
"type": "shell",
|
|
54
54
|
"environment_vars": [
|
|
55
|
-
"PWN_ROOT
|
|
55
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
56
56
|
"PWN_PROVIDER=aws"
|
|
57
57
|
],
|
|
58
58
|
"scripts": [
|
|
@@ -71,7 +71,7 @@
|
|
|
71
71
|
"pause_before": "180s",
|
|
72
72
|
"type": "shell",
|
|
73
73
|
"environment_vars": [
|
|
74
|
-
"PWN_ROOT
|
|
74
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
75
75
|
"PWN_PROVIDER=aws"
|
|
76
76
|
],
|
|
77
77
|
"scripts": [
|
|
@@ -39,7 +39,7 @@
|
|
|
39
39
|
{
|
|
40
40
|
"type": "shell",
|
|
41
41
|
"environment_vars": [
|
|
42
|
-
"PWN_ROOT
|
|
42
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
43
43
|
"PWN_PROVIDER=qemu"
|
|
44
44
|
],
|
|
45
45
|
"scripts": [
|
|
@@ -75,7 +75,7 @@
|
|
|
75
75
|
"pause_before": "180s",
|
|
76
76
|
"type": "shell",
|
|
77
77
|
"environment_vars": [
|
|
78
|
-
"PWN_ROOT
|
|
78
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
79
79
|
"PWN_PROVIDER=qemu"
|
|
80
80
|
],
|
|
81
81
|
"scripts": [
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
{
|
|
44
44
|
"type": "shell",
|
|
45
45
|
"environment_vars": [
|
|
46
|
-
"PWN_ROOT
|
|
46
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
47
47
|
"PWN_PROVIDER=virtualbox"
|
|
48
48
|
],
|
|
49
49
|
"scripts": [
|
|
@@ -63,7 +63,7 @@
|
|
|
63
63
|
"pause_before": "180s",
|
|
64
64
|
"type": "shell",
|
|
65
65
|
"environment_vars": [
|
|
66
|
-
"PWN_ROOT
|
|
66
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
67
67
|
"PWN_PROVIDER=virtualbox"
|
|
68
68
|
],
|
|
69
69
|
"scripts": [
|
|
@@ -83,7 +83,7 @@
|
|
|
83
83
|
"pause_before": "180s",
|
|
84
84
|
"type": "shell",
|
|
85
85
|
"environment_vars": [
|
|
86
|
-
"PWN_ROOT
|
|
86
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
87
87
|
"PWN_PROVIDER=virtualbox"
|
|
88
88
|
],
|
|
89
89
|
"scripts": [
|
|
@@ -102,7 +102,7 @@
|
|
|
102
102
|
"pause_before": "180s",
|
|
103
103
|
"type": "shell",
|
|
104
104
|
"environment_vars": [
|
|
105
|
-
"PWN_ROOT
|
|
105
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
106
106
|
"PWN_PROVIDER=virtualbox"
|
|
107
107
|
],
|
|
108
108
|
"scripts": [
|
|
@@ -43,7 +43,7 @@
|
|
|
43
43
|
{
|
|
44
44
|
"type": "shell",
|
|
45
45
|
"environment_vars": [
|
|
46
|
-
"PWN_ROOT
|
|
46
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
47
47
|
"PWN_PROVIDER=vmware"
|
|
48
48
|
],
|
|
49
49
|
"scripts": [
|
|
@@ -63,7 +63,7 @@
|
|
|
63
63
|
"pause_before": "180s",
|
|
64
64
|
"type": "shell",
|
|
65
65
|
"environment_vars": [
|
|
66
|
-
"PWN_ROOT
|
|
66
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
67
67
|
"PWN_PROVIDER=vmware"
|
|
68
68
|
],
|
|
69
69
|
"scripts": [
|
|
@@ -83,7 +83,7 @@
|
|
|
83
83
|
"pause_before": "180s",
|
|
84
84
|
"type": "shell",
|
|
85
85
|
"environment_vars": [
|
|
86
|
-
"PWN_ROOT
|
|
86
|
+
"PWN_ROOT=\$(ruby -r pwn -e 'puts \"#{Gem.path.first}/gems/pwn-#{PWN::VERSION}\"')",
|
|
87
87
|
"PWN_PROVIDER=vmware"
|
|
88
88
|
],
|
|
89
89
|
"scripts": [
|
|
@@ -5,15 +5,15 @@ require 'yaml'
|
|
|
5
5
|
|
|
6
6
|
# Install Metasploit from Source
|
|
7
7
|
printf 'Installing Metasploit *****************************************************************'
|
|
8
|
-
if ENV
|
|
9
|
-
pwn_root = ENV
|
|
8
|
+
if ENV.fetch('PWN_ROOT')
|
|
9
|
+
pwn_root = ENV.fetch('PWN_ROOT')
|
|
10
10
|
elsif Dir.exist?('/pwn')
|
|
11
11
|
pwn_root = '/pwn'
|
|
12
12
|
else
|
|
13
13
|
pwn_root = Dir.pwd
|
|
14
14
|
end
|
|
15
15
|
|
|
16
|
-
pwn_provider = ENV
|
|
16
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
17
17
|
|
|
18
18
|
metasploit_root = '/opt/metasploit-framework-dev'
|
|
19
19
|
`sudo git clone https://github.com/rapid7/metasploit-framework.git #{metasploit_root}`
|
|
@@ -5,15 +5,15 @@ require 'yaml'
|
|
|
5
5
|
require 'digest'
|
|
6
6
|
require 'fileutils'
|
|
7
7
|
|
|
8
|
-
if ENV
|
|
9
|
-
pwn_root = ENV
|
|
8
|
+
if ENV.fetch('PWN_ROOT')
|
|
9
|
+
pwn_root = ENV.fetch('PWN_ROOT')
|
|
10
10
|
elsif Dir.exist?('/pwn')
|
|
11
11
|
pwn_root = '/pwn'
|
|
12
12
|
else
|
|
13
13
|
pwn_root = Dir.pwd
|
|
14
14
|
end
|
|
15
15
|
|
|
16
|
-
pwn_provider = ENV
|
|
16
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
17
17
|
userland_config = "#{pwn_root}/etc/userland/#{pwn_provider}/burpsuite/vagrant.yaml"
|
|
18
18
|
userland_burpsuite_pro_jar_path = "#{pwn_root}/third_party/burpsuite-pro.jar"
|
|
19
19
|
burpsuite_pro_jar_dest_path = "/opt/burpsuite/#{File.basename(userland_burpsuite_pro_jar_path)}"
|
|
@@ -4,15 +4,15 @@
|
|
|
4
4
|
require 'yaml'
|
|
5
5
|
require 'pwn'
|
|
6
6
|
|
|
7
|
-
if ENV
|
|
8
|
-
pwn_root = ENV
|
|
7
|
+
if ENV.fetch('PWN_ROOT')
|
|
8
|
+
pwn_root = ENV.fetch('PWN_ROOT')
|
|
9
9
|
elsif Dir.exist?('/pwn')
|
|
10
10
|
pwn_root = '/pwn'
|
|
11
11
|
else
|
|
12
12
|
pwn_root = Dir.pwd
|
|
13
13
|
end
|
|
14
14
|
|
|
15
|
-
pwn_provider = ENV
|
|
15
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
16
16
|
jenkins_userland_config = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/jenkins/vagrant.yaml")
|
|
17
17
|
private_key_path = '/var/lib/jenkins/.ssh/id_rsa-pwn_jenkins'
|
|
18
18
|
userland_ssh_keygen_pass = jenkins_userland_config['ssh_keygen_pass']
|
|
@@ -4,15 +4,15 @@
|
|
|
4
4
|
require 'yaml'
|
|
5
5
|
|
|
6
6
|
print "Installing Let's Encrypt **************************************************************"
|
|
7
|
-
if ENV
|
|
8
|
-
pwn_root = ENV
|
|
7
|
+
if ENV.fetch('PWN_ROOT')
|
|
8
|
+
pwn_root = ENV.fetch('PWN_ROOT')
|
|
9
9
|
elsif Dir.exist?('/pwn')
|
|
10
10
|
pwn_root = '/pwn'
|
|
11
11
|
else
|
|
12
12
|
pwn_root = Dir.pwd
|
|
13
13
|
end
|
|
14
14
|
|
|
15
|
-
pwn_provider = ENV
|
|
15
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
16
16
|
letsencrypt_git = 'https://github.com/letsencrypt/letsencrypt'
|
|
17
17
|
letsencrypt_root = '/opt/letsencrypt-git'
|
|
18
18
|
letsencrypt_yaml = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/letsencrypt/vagrant.yaml")
|
|
@@ -3,15 +3,15 @@
|
|
|
3
3
|
|
|
4
4
|
require 'yaml'
|
|
5
5
|
|
|
6
|
-
if
|
|
7
|
-
pwn_root = ENV
|
|
6
|
+
if ENVfetch('PWN_ROOT')
|
|
7
|
+
pwn_root = ENV.fetch('PWN_ROOT')
|
|
8
8
|
elsif Dir.exist?('/pwn')
|
|
9
9
|
pwn_root = '/pwn'
|
|
10
10
|
else
|
|
11
11
|
pwn_root = Dir.pwd
|
|
12
12
|
end
|
|
13
13
|
|
|
14
|
-
pwn_provider = ENV
|
|
14
|
+
pwn_provider = ENV.fetch('PWN_PROVIDER') if ENV.fetch('PWN_PROVIDER')
|
|
15
15
|
jenkins_userland_config = YAML.load_file("#{pwn_root}/etc/userland/#{pwn_provider}/jenkins/vagrant.yaml")
|
|
16
16
|
userland_user = jenkins_userland_config['user']
|
|
17
17
|
userland_pass = jenkins_userland_config['pass']
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: pwn
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.4.
|
|
4
|
+
version: 0.4.409
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- 0day Inc.
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2022-04-
|
|
11
|
+
date: 2022-04-21 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: activesupport
|
|
@@ -100,28 +100,28 @@ dependencies:
|
|
|
100
100
|
requirements:
|
|
101
101
|
- - '='
|
|
102
102
|
- !ruby/object:Gem::Version
|
|
103
|
-
version: 4.
|
|
103
|
+
version: 4.15.0
|
|
104
104
|
type: :runtime
|
|
105
105
|
prerelease: false
|
|
106
106
|
version_requirements: !ruby/object:Gem::Requirement
|
|
107
107
|
requirements:
|
|
108
108
|
- - '='
|
|
109
109
|
- !ruby/object:Gem::Version
|
|
110
|
-
version: 4.
|
|
110
|
+
version: 4.15.0
|
|
111
111
|
- !ruby/object:Gem::Dependency
|
|
112
112
|
name: bundler
|
|
113
113
|
requirement: !ruby/object:Gem::Requirement
|
|
114
114
|
requirements:
|
|
115
115
|
- - ">="
|
|
116
116
|
- !ruby/object:Gem::Version
|
|
117
|
-
version: 2.3.
|
|
117
|
+
version: 2.3.12
|
|
118
118
|
type: :development
|
|
119
119
|
prerelease: false
|
|
120
120
|
version_requirements: !ruby/object:Gem::Requirement
|
|
121
121
|
requirements:
|
|
122
122
|
- - ">="
|
|
123
123
|
- !ruby/object:Gem::Version
|
|
124
|
-
version: 2.3.
|
|
124
|
+
version: 2.3.12
|
|
125
125
|
- !ruby/object:Gem::Dependency
|
|
126
126
|
name: bundler-audit
|
|
127
127
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -660,14 +660,14 @@ dependencies:
|
|
|
660
660
|
requirements:
|
|
661
661
|
- - '='
|
|
662
662
|
- !ruby/object:Gem::Version
|
|
663
|
-
version: 1.
|
|
663
|
+
version: 1.28.1
|
|
664
664
|
type: :runtime
|
|
665
665
|
prerelease: false
|
|
666
666
|
version_requirements: !ruby/object:Gem::Requirement
|
|
667
667
|
requirements:
|
|
668
668
|
- - '='
|
|
669
669
|
- !ruby/object:Gem::Version
|
|
670
|
-
version: 1.
|
|
670
|
+
version: 1.28.1
|
|
671
671
|
- !ruby/object:Gem::Dependency
|
|
672
672
|
name: rubocop-rake
|
|
673
673
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -688,14 +688,14 @@ dependencies:
|
|
|
688
688
|
requirements:
|
|
689
689
|
- - '='
|
|
690
690
|
- !ruby/object:Gem::Version
|
|
691
|
-
version: 2.
|
|
691
|
+
version: 2.10.0
|
|
692
692
|
type: :runtime
|
|
693
693
|
prerelease: false
|
|
694
694
|
version_requirements: !ruby/object:Gem::Requirement
|
|
695
695
|
requirements:
|
|
696
696
|
- - '='
|
|
697
697
|
- !ruby/object:Gem::Version
|
|
698
|
-
version: 2.
|
|
698
|
+
version: 2.10.0
|
|
699
699
|
- !ruby/object:Gem::Dependency
|
|
700
700
|
name: ruby-audio
|
|
701
701
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -1943,14 +1943,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
|
1943
1943
|
requirements:
|
|
1944
1944
|
- - ">="
|
|
1945
1945
|
- !ruby/object:Gem::Version
|
|
1946
|
-
version: 3.1.
|
|
1946
|
+
version: 3.1.2
|
|
1947
1947
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
|
1948
1948
|
requirements:
|
|
1949
1949
|
- - ">="
|
|
1950
1950
|
- !ruby/object:Gem::Version
|
|
1951
1951
|
version: '0'
|
|
1952
1952
|
requirements: []
|
|
1953
|
-
rubygems_version: 3.3.
|
|
1953
|
+
rubygems_version: 3.3.12
|
|
1954
1954
|
signing_key:
|
|
1955
1955
|
specification_version: 4
|
|
1956
1956
|
summary: Automated Security Testing for CI/CD Pipelines & Beyond
|