Skip to content

Commit 81adab5

Browse files
committed
add simulation type fields
1 parent 212e6a4 commit 81adab5

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

website/management/commands/create_commands_injection_tasks.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,7 @@ class Command(LabSeederCommand):
5454
"description": "Practice basic command injection with simple payloads",
5555
"task_type": "simulation",
5656
"simulation_config": {
57+
"type": "basic_command_injection",
5758
"scenario": "ping_feature",
5859
"vulnerable_parameters": ["ip_address"],
5960
"success_criteria": "Execute a command that shows the current directory contents",
@@ -70,6 +71,7 @@ class Command(LabSeederCommand):
7071
"description": "Use pipe operators for command injection",
7172
"task_type": "simulation",
7273
"simulation_config": {
74+
"type": "pipes_command_injection",
7375
"scenario": "ping_filter_semicolon",
7476
"vulnerable_parameters": ["ip_address"],
7577
"success_criteria": "Execute a command that shows system information",
@@ -86,6 +88,7 @@ class Command(LabSeederCommand):
8688
"description": "Practice blind command injection techniques",
8789
"task_type": "simulation",
8890
"simulation_config": {
91+
"type": "blind_command_injection",
8992
"scenario": "blind_injection",
9093
"vulnerable_parameters": ["ip_address"],
9194
"success_criteria": "Cause a measurable time delay",
@@ -124,6 +127,7 @@ class Command(LabSeederCommand):
124127
"description": "Practice advanced command injection with encoding",
125128
"task_type": "simulation",
126129
"simulation_config": {
130+
"type": "advanced_command_injection",
127131
"scenario": "filter_bypass",
128132
"vulnerable_parameters": ["ip_address"],
129133
"success_criteria": "Execute a command that shows the current user",

0 commit comments

Comments
 (0)