This test environment provides realistic vulnerability scenarios for testing the complete SecureChain pipeline.
- Comprehensive network scan results
- Multiple hosts with various vulnerabilities
- Realistic service versions and configurations
- Sample threat intelligence data
- CVE mappings to threat actors
- MITRE ATT&CK technique associations
- Realistic attack scenarios
- Multi-step attack chains
- MITRE ATT&CK technique mappings
- Normalized vulnerability findings
- Ready for ingestion into SecureChain backend
- Includes asset classification and risk scoring
- Vulnerabilities: CVE-2021-44228 (Log4j), CVE-2021-41773 (Apache)
- Services: HTTP (80), HTTPS (443), SSH (22)
- Risk Level: Critical
- Vulnerabilities: CVE-2020-14867 (MySQL)
- Services: MySQL (3306), SSH (22)
- Risk Level: High
- Vulnerabilities: CVE-2018-15473 (SSH)
- Services: SSH (22)
- Risk Level: Medium
- Vulnerabilities: CVE-2011-2523 (vsftpd), CVE-2017-0144 (EternalBlue)
- Services: FTP (21), SMB (445)
- Risk Level: Critical
- Vulnerabilities: CVE-2019-0708 (BlueKeep)
- Services: RDP (3389)
- Risk Level: Critical
- Exploit Log4j vulnerability in web server
- Perform network discovery
- Lateral movement to database server via SSH
- Privilege escalation using MySQL vulnerability
- Data exfiltration
- Exploit BlueKeep RDP vulnerability
- Establish persistence
- Credential dumping
- Domain enumeration
- Exploit vsftpd backdoor
- Network scanning for SMB services
- EternalBlue exploitation
- Self-replication
python AI-Vuln-Scanner/vulnscanner.py -t scanme.nmap.org -p 1 -o jsonpython attackGraph/attack_graph_generator.pypython backend/test_backend_with_data.pypython comprehensive_pipeline_test.pypython test_chatbot_vulnerabilities.py- AI Scanner: Should identify vulnerabilities and generate analysis
- OpenCTI: Should enrich findings with threat intelligence
- Attack Graph: Should generate visual attack paths
- Backend: Should store and retrieve findings
- Chatbot: Should answer vulnerability-related questions
- Scanner fails: Check target accessibility and permissions
- OpenCTI connection: Verify OpenCTI is running and accessible
- Database errors: Check PostgreSQL and Neo4j connections
- Chatbot unresponsive: Verify chatbot service is running
pipeline_test.log: Comprehensive test execution logchatbot_test_results.json: Detailed chatbot test resultsattack_graph_test.json: Attack graph analysis results
This test environment contains intentionally vulnerable configurations. DO NOT deploy in production environments. Use only for testing and educational purposes.