Spaces:
Paused
Paused
Update knowledge_base.json
Browse files- knowledge_base.json +118 -33
knowledge_base.json
CHANGED
|
@@ -1,33 +1,118 @@
|
|
| 1 |
-
|
| 2 |
-
|
| 3 |
-
|
| 4 |
-
|
| 5 |
-
|
| 6 |
-
|
| 7 |
-
|
| 8 |
-
|
| 9 |
-
|
| 10 |
-
|
| 11 |
-
|
| 12 |
-
|
| 13 |
-
|
| 14 |
-
|
| 15 |
-
|
| 16 |
-
|
| 17 |
-
|
| 18 |
-
|
| 19 |
-
|
| 20 |
-
|
| 21 |
-
|
| 22 |
-
|
| 23 |
-
|
| 24 |
-
|
| 25 |
-
|
| 26 |
-
|
| 27 |
-
|
| 28 |
-
|
| 29 |
-
|
| 30 |
-
|
| 31 |
-
|
| 32 |
-
|
| 33 |
-
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
[
|
| 2 |
+
{
|
| 3 |
+
"text": "nmap -sV -O 192.168.1.0/24",
|
| 4 |
+
"source": "successful_command"
|
| 5 |
+
},
|
| 6 |
+
{
|
| 7 |
+
"text": "sqlmap -u http://example.com/login --dbs",
|
| 8 |
+
"source": "successful_command"
|
| 9 |
+
},
|
| 10 |
+
{
|
| 11 |
+
"text": "subfinder -d example.com",
|
| 12 |
+
"source": "successful_command"
|
| 13 |
+
},
|
| 14 |
+
{
|
| 15 |
+
"text": "gobuster dir -u http://example.com -w /path/to/wordlist.txt",
|
| 16 |
+
"source": "successful_command"
|
| 17 |
+
},
|
| 18 |
+
{
|
| 19 |
+
"text": "SQL injection vulnerability detected",
|
| 20 |
+
"source": "vulnerability_pattern"
|
| 21 |
+
},
|
| 22 |
+
{
|
| 23 |
+
"text": "XSS vulnerability in search parameter",
|
| 24 |
+
"source": "vulnerability_pattern"
|
| 25 |
+
},
|
| 26 |
+
{
|
| 27 |
+
"text": "Open port 22 (SSH) detected, potential brute-force target",
|
| 28 |
+
"source": "vulnerability_pattern"
|
| 29 |
+
},
|
| 30 |
+
{
|
| 31 |
+
"text": "Outdated Apache version found, check CVEs for version X.Y.Z",
|
| 32 |
+
"source": "vulnerability_pattern"
|
| 33 |
+
},
|
| 34 |
+
{
|
| 35 |
+
"text": "Directory listing enabled on /admin",
|
| 36 |
+
"source": "vulnerability_pattern"
|
| 37 |
+
},
|
| 38 |
+
{
|
| 39 |
+
"text": "Weak credentials found for service XYZ",
|
| 40 |
+
"source": "vulnerability_pattern"
|
| 41 |
+
},
|
| 42 |
+
{
|
| 43 |
+
"text": "windows/x64/meterpreter/reverse_tcp",
|
| 44 |
+
"source": "payload_windows"
|
| 45 |
+
},
|
| 46 |
+
{
|
| 47 |
+
"text": "windows/meterpreter/reverse_tcp",
|
| 48 |
+
"source": "payload_windows"
|
| 49 |
+
},
|
| 50 |
+
{
|
| 51 |
+
"text": "linux/x64/meterpreter/reverse_tcp",
|
| 52 |
+
"source": "payload_linux"
|
| 53 |
+
},
|
| 54 |
+
{
|
| 55 |
+
"text": "linux/x86/meterpreter/reverse_tcp",
|
| 56 |
+
"source": "payload_linux"
|
| 57 |
+
},
|
| 58 |
+
{
|
| 59 |
+
"text": "<script>alert('XSS');</script>",
|
| 60 |
+
"source": "payload_web"
|
| 61 |
+
},
|
| 62 |
+
{
|
| 63 |
+
"text": "' OR 1=1--",
|
| 64 |
+
"source": "payload_web"
|
| 65 |
+
},
|
| 66 |
+
{
|
| 67 |
+
"text": "UNION SELECT null,null,null,version()-- -",
|
| 68 |
+
"source": "payload_web"
|
| 69 |
+
},
|
| 70 |
+
{
|
| 71 |
+
"text": "Command not found: Try installing the required package. Use `sudo apt install <package_name>` or `pip install <package_name>`.",
|
| 72 |
+
"source": "error_correction"
|
| 73 |
+
},
|
| 74 |
+
{
|
| 75 |
+
"text": "Permission denied: Try running with sudo or check file permissions.",
|
| 76 |
+
"source": "error_correction"
|
| 77 |
+
},
|
| 78 |
+
{
|
| 79 |
+
"text": "Connection refused: Target host or port might be down or blocked by firewall.",
|
| 80 |
+
"source": "error_correction"
|
| 81 |
+
},
|
| 82 |
+
{
|
| 83 |
+
"text": "No targets specified: Ensure you provide a valid IP address or URL.",
|
| 84 |
+
"source": "error_correction"
|
| 85 |
+
},
|
| 86 |
+
{
|
| 87 |
+
"text": "Shodan API Key not configured: Set the SHODAN_API_KEY environment variable.",
|
| 88 |
+
"source": "error_correction"
|
| 89 |
+
},
|
| 90 |
+
{
|
| 91 |
+
"text": "Always start with basic network scanning (nmap).",
|
| 92 |
+
"source": "recon_tip"
|
| 93 |
+
},
|
| 94 |
+
{
|
| 95 |
+
"text": "Enumerate subdomains for larger attack surface.",
|
| 96 |
+
"source": "recon_tip"
|
| 97 |
+
},
|
| 98 |
+
{
|
| 99 |
+
"text": "Check for open ports and services, then research known vulnerabilities for those services.",
|
| 100 |
+
"source": "recon_tip"
|
| 101 |
+
},
|
| 102 |
+
{
|
| 103 |
+
"text": "Use OSINT tools to gather information about the target organization and its employees.",
|
| 104 |
+
"source": "recon_tip"
|
| 105 |
+
},
|
| 106 |
+
{
|
| 107 |
+
"text": "After finding a vulnerability, check ExploitDB and Metasploit for existing exploits.",
|
| 108 |
+
"source": "exploit_tip"
|
| 109 |
+
},
|
| 110 |
+
{
|
| 111 |
+
"text": "Always verify payload delivery and listener setup.",
|
| 112 |
+
"source": "exploit_tip"
|
| 113 |
+
},
|
| 114 |
+
{
|
| 115 |
+
"text": "Prioritize remote code execution (RCE) vulnerabilities.",
|
| 116 |
+
"source": "exploit_tip"
|
| 117 |
+
}
|
| 118 |
+
]
|