Created
May 3, 2015 12:18
-
-
Save xntrik/4d9715e62debb6088efa to your computer and use it in GitHub Desktop.
Demo gauntlt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@slow | |
Feature: Simple security scan against SSA | |
Background: | |
Given "nmap" is installed | |
And "curl" is installed | |
And "arachni" is installed | |
And the following profile: | |
| name | value | | |
| hostname | ssa.asteriskinfosec.com.au | | |
| host | ssa.asteriskinfosec.com.au | | |
| url | https://ssa.asteriskinfosec.com.au/ | | |
| tcp_ping_ports | 22,25,80,443 | | |
Scenario: Verify server is open on expected set of ports using the nmap-fast attack step | |
When I launch a "nmap-fast" attack | |
Then the output should match /81.tcp\s+open/ | |
And the output should match /443.tcp\s+open/ | |
Scenario: Verify that there are no unexpected ports open | |
When I launch an "nmap" attack with: | |
""" | |
nmap -F <hostname> | |
""" | |
Then the output should not contain: | |
""" | |
22/tcp | |
25/tcp | |
""" | |
Scenario: HTTP request should redirect to HTTPS | |
When I launch a "curl" attack with: | |
""" | |
curl --silent --output /dev/null --write-out "%{http_code}" <hostname> | |
""" | |
Then it should pass with exactly: | |
""" | |
301 | |
""" | |
Scenario: Look for XSS flaws on the front page | |
When I launch an "arachni-simple_xss" attack | |
Then the output should contain "0 issues were detected" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment