Generate GUIDs from job=generate-docs branch=master [skip ci]
This commit is contained in:
@@ -121,6 +121,7 @@ atomic_tests:
|
||||
python #{filename} -i #{host_ip}
|
||||
name: powershell
|
||||
- name: WinPwn - spoolvulnscan
|
||||
auto_generated_guid: 54574908-f1de-4356-9021-8053dd57439a
|
||||
description: Start MS-RPRN RPC Service Scan using spoolvulnscan function of WinPwn
|
||||
supported_platforms:
|
||||
- windows
|
||||
@@ -131,6 +132,7 @@ atomic_tests:
|
||||
spoolvulnscan -noninteractive -consoleoutput
|
||||
name: powershell
|
||||
- name: WinPwn - MS17-10
|
||||
auto_generated_guid: 97585b04-5be2-40e9-8c31-82157b8af2d6
|
||||
description: Search for MS17-10 vulnerable Windows Servers in the domain using powerSQL function of WinPwn
|
||||
supported_platforms:
|
||||
- windows
|
||||
@@ -141,6 +143,7 @@ atomic_tests:
|
||||
MS17-10 -noninteractive -consoleoutput
|
||||
name: powershell
|
||||
- name: WinPwn - bluekeep
|
||||
auto_generated_guid: 1cca5640-32a9-46e6-b8e0-fabbe2384a73
|
||||
description: Search for bluekeep vulnerable Windows Systems in the domain using bluekeep function of WinPwn. Can take many minutes to complete (~600 seconds in testing on a small domain).
|
||||
supported_platforms:
|
||||
- windows
|
||||
@@ -151,6 +154,7 @@ atomic_tests:
|
||||
bluekeep -noninteractive -consoleoutput
|
||||
name: powershell
|
||||
- name: WinPwn - fruit
|
||||
auto_generated_guid: bb037826-cbe8-4a41-93ea-b94059d6bb98
|
||||
description: Search for potentially vulnerable web apps (low hanging fruits) using fruit function of WinPwn
|
||||
supported_platforms:
|
||||
- windows
|
||||
|
||||
@@ -999,3 +999,7 @@ eea1d918-825e-47dd-acc2-814d6c58c0e1
|
||||
7804659b-fdbf-4cf6-b06a-c03e758590e8
|
||||
3278b2f6-f733-4875-9ef4-bfed34244f0a
|
||||
dec6a0d8-bcaf-4c22-9d48-2aee59fb692b
|
||||
54574908-f1de-4356-9021-8053dd57439a
|
||||
97585b04-5be2-40e9-8c31-82157b8af2d6
|
||||
1cca5640-32a9-46e6-b8e0-fabbe2384a73
|
||||
bb037826-cbe8-4a41-93ea-b94059d6bb98
|
||||
|
||||
Reference in New Issue
Block a user