MrA7A commited on
Commit
17c7f17
·
verified ·
1 Parent(s): d74713b

Update knowledge_base.json

Browse files
Files changed (1) hide show
  1. knowledge_base.json +118 -33
knowledge_base.json CHANGED
@@ -1,33 +1,118 @@
1
- {
2
- "items": [
3
- { "text": "nmap -sV -O 192.168.1.0/24", "source": "successful_command" },
4
- { "text": "sqlmap -u http://example.com/login --dbs", "source": "successful_command" },
5
- { "text": "subfinder -d example.com", "source": "successful_command" },
6
- { "text": "gobuster dir -u http://example.com -w /path/to/wordlist.txt", "source": "successful_command" },
7
- { "text": "SQL injection vulnerability detected", "source": "vulnerability_pattern" },
8
- { "text": "XSS vulnerability in search parameter", "source": "vulnerability_pattern" },
9
- { "text": "Open port 22 (SSH) detected, potential brute-force target", "source": "vulnerability_pattern" },
10
- { "text": "Outdated Apache version found, check CVEs for version X.Y.Z", "source": "vulnerability_pattern" },
11
- { "text": "Directory listing enabled on /admin", "source": "vulnerability_pattern" },
12
- { "text": "Weak credentials found for service XYZ", "source": "vulnerability_pattern" },
13
- { "text": "windows/x64/meterpreter/reverse_tcp", "source": "payload_windows" },
14
- { "text": "windows/meterpreter/reverse_tcp", "source": "payload_windows" },
15
- { "text": "linux/x64/meterpreter/reverse_tcp", "source": "payload_linux" },
16
- { "text": "linux/x86/meterpreter/reverse_tcp", "source": "payload_linux" },
17
- { "text": "<script>alert('XSS');</script>", "source": "payload_web" },
18
- { "text": "' OR 1=1--", "source": "payload_web" },
19
- { "text": "UNION SELECT null,null,null,version()-- -", "source": "payload_web" },
20
- { "text": "Command not found: Try installing the required package. Use `sudo apt install <package_name>` or `pip install <package_name>`.", "source": "error_correction" },
21
- { "text": "Permission denied: Try running with sudo or check file permissions.", "source": "error_correction" },
22
- { "text": "Connection refused: Target host or port might be down or blocked by firewall.", "source": "error_correction" },
23
- { "text": "No targets specified: Ensure you provide a valid IP address or URL.", "source": "error_correction" },
24
- { "text": "Shodan API Key not configured: Set the SHODAN_API_KEY environment variable.", "source": "error_correction" },
25
- { "text": "Always start with basic network scanning (nmap).", "source": "recon_tip" },
26
- { "text": "Enumerate subdomains for larger attack surface.", "source": "recon_tip" },
27
- { "text": "Check for open ports and services, then research known vulnerabilities for those services.", "source": "recon_tip" },
28
- { "text": "Use OSINT tools to gather information about the target organization and its employees.", "source": "recon_tip" },
29
- { "text": "After finding a vulnerability, check ExploitDB and Metasploit for existing exploits.", "source": "exploit_tip" },
30
- { "text": "Always verify payload delivery and listener setup.", "source": "exploit_tip" },
31
- { "text": "Prioritize remote code execution (RCE) vulnerabilities.", "source": "exploit_tip" }
32
- ]
33
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [
2
+ {
3
+ "text": "nmap -sV -O 192.168.1.0/24",
4
+ "source": "successful_command"
5
+ },
6
+ {
7
+ "text": "sqlmap -u http://example.com/login --dbs",
8
+ "source": "successful_command"
9
+ },
10
+ {
11
+ "text": "subfinder -d example.com",
12
+ "source": "successful_command"
13
+ },
14
+ {
15
+ "text": "gobuster dir -u http://example.com -w /path/to/wordlist.txt",
16
+ "source": "successful_command"
17
+ },
18
+ {
19
+ "text": "SQL injection vulnerability detected",
20
+ "source": "vulnerability_pattern"
21
+ },
22
+ {
23
+ "text": "XSS vulnerability in search parameter",
24
+ "source": "vulnerability_pattern"
25
+ },
26
+ {
27
+ "text": "Open port 22 (SSH) detected, potential brute-force target",
28
+ "source": "vulnerability_pattern"
29
+ },
30
+ {
31
+ "text": "Outdated Apache version found, check CVEs for version X.Y.Z",
32
+ "source": "vulnerability_pattern"
33
+ },
34
+ {
35
+ "text": "Directory listing enabled on /admin",
36
+ "source": "vulnerability_pattern"
37
+ },
38
+ {
39
+ "text": "Weak credentials found for service XYZ",
40
+ "source": "vulnerability_pattern"
41
+ },
42
+ {
43
+ "text": "windows/x64/meterpreter/reverse_tcp",
44
+ "source": "payload_windows"
45
+ },
46
+ {
47
+ "text": "windows/meterpreter/reverse_tcp",
48
+ "source": "payload_windows"
49
+ },
50
+ {
51
+ "text": "linux/x64/meterpreter/reverse_tcp",
52
+ "source": "payload_linux"
53
+ },
54
+ {
55
+ "text": "linux/x86/meterpreter/reverse_tcp",
56
+ "source": "payload_linux"
57
+ },
58
+ {
59
+ "text": "<script>alert('XSS');</script>",
60
+ "source": "payload_web"
61
+ },
62
+ {
63
+ "text": "' OR 1=1--",
64
+ "source": "payload_web"
65
+ },
66
+ {
67
+ "text": "UNION SELECT null,null,null,version()-- -",
68
+ "source": "payload_web"
69
+ },
70
+ {
71
+ "text": "Command not found: Try installing the required package. Use `sudo apt install <package_name>` or `pip install <package_name>`.",
72
+ "source": "error_correction"
73
+ },
74
+ {
75
+ "text": "Permission denied: Try running with sudo or check file permissions.",
76
+ "source": "error_correction"
77
+ },
78
+ {
79
+ "text": "Connection refused: Target host or port might be down or blocked by firewall.",
80
+ "source": "error_correction"
81
+ },
82
+ {
83
+ "text": "No targets specified: Ensure you provide a valid IP address or URL.",
84
+ "source": "error_correction"
85
+ },
86
+ {
87
+ "text": "Shodan API Key not configured: Set the SHODAN_API_KEY environment variable.",
88
+ "source": "error_correction"
89
+ },
90
+ {
91
+ "text": "Always start with basic network scanning (nmap).",
92
+ "source": "recon_tip"
93
+ },
94
+ {
95
+ "text": "Enumerate subdomains for larger attack surface.",
96
+ "source": "recon_tip"
97
+ },
98
+ {
99
+ "text": "Check for open ports and services, then research known vulnerabilities for those services.",
100
+ "source": "recon_tip"
101
+ },
102
+ {
103
+ "text": "Use OSINT tools to gather information about the target organization and its employees.",
104
+ "source": "recon_tip"
105
+ },
106
+ {
107
+ "text": "After finding a vulnerability, check ExploitDB and Metasploit for existing exploits.",
108
+ "source": "exploit_tip"
109
+ },
110
+ {
111
+ "text": "Always verify payload delivery and listener setup.",
112
+ "source": "exploit_tip"
113
+ },
114
+ {
115
+ "text": "Prioritize remote code execution (RCE) vulnerabilities.",
116
+ "source": "exploit_tip"
117
+ }
118
+ ]