-
Notifications
You must be signed in to change notification settings - Fork 0
/
attacks.json
102 lines (102 loc) · 3.1 KB
/
attacks.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
[
{
"attackId":"51-ping-of-death",
"attackName":"Ping of Death",
"description":"Send a DEATH Ping message",
"attackType": "pcap",
"pcapFileName": "51.ping_of_death.pcap",
"destIP": "192.168.0.55"
},
{
"attackId":"20-icmp-redirect-flood",
"attackName":"ICMP Redirect Flood",
"description":"ICMP Redirect Flood attack",
"attackType": "pcap",
"pcapFileName": "20.icmp_redirect_flood.pcap",
"destIP": "217.70.184.38"
},
{
"attackId":"23-ip-frag-opverlapping",
"attackName":"IP Fragmentation Overlapping",
"description":"IP Fragmentation Overlapping attack",
"attackType": "pcap",
"pcapFileName": "23.ip_frag_overlapping.pcap",
"destIP": "192.168.0.101"
},
{
"attackId":"45-tcp-maimon-scan",
"attackName":"TCP MAIMON Scan",
"description":"TCP MAIMON Scan attack",
"attackType": "pcap",
"pcapFileName": "45.TCP_Maimon_scan.pcap",
"destIP": "192.168.0.101"
},
{
"attackId":"27-udp-scan",
"attackName":"UDP Scan",
"description":"UDP Scan attack",
"attackType": "pcap",
"pcapFileName": "27.udp_scan.pcap",
"destIP": "192.168.0.194"
},
{
"attackId":"28-xmas-scan",
"attackName":"Xmas Scan",
"description":"Xmas Scan attack",
"attackType": "pcap",
"pcapFileName": "28.xmas_scan.pcap",
"destIP": "192.168.0.194"
},
{
"attackId":"33-trojan",
"attackName":"Trojan",
"description":"Trojan attack",
"attackType": "pcap",
"pcapFileName": "33.trojan.pcap",
"destIP": "192.168.0.101"
},
{
"attackId":"38-wanna-cry",
"attackName":"Wanna Cry",
"description":"Wanna Cry attack",
"attackType": "pcap",
"pcapFileName": "38.WannaCry.pcap",
"destIP": "192.168.0.199"
},
{
"attackId":"ping-of-death",
"attackName":"Ping of Death",
"description":"Send a DEATH Ping message",
"attackType": "script",
"scriptFileName": "ping_of_death.py",
"exeApp": "python3.10",
"extraParametersHelper": "<targetURL>"
},
{
"attackId":"ssh-bruteforce-attack",
"attackName":"SSH BruteForce Attack",
"description":"SSH BruteForce Attack",
"attackType": "script",
"scriptFileName": "ssh_brute_force.py",
"exeApp": "python3.10",
"extraParametersHelper": "<targetIP> <targetPort> <username> <password1[,password2,password3]>"
},
{
"attackId":"sql-injection-attack",
"attackName":"SQL Injection Attack",
"description":"SQL Injection Attack. Require to have at least one form in the home page of the victime: http://ip_address:port_number",
"attackType": "script",
"scriptFileName": "sql_injection.py",
"exeApp": "python3.10",
"extraParametersHelper": "<targetURL> <control_name> <attackString1[,attackString2,attackString3]>"
},
{
"attackId":"slowloris",
"attackName":"Slowloris attack",
"description":"Slowloris is basically an HTTP Denial of Service attack that affects threaded servers",
"attackType": "script",
"scriptFileName": "slowloris/slowloris.py",
"exeApp": "python3.10",
"extraParametersHelper": "<host> [-p <port> -s <number_of_sockets>] --https"
}
]