Skip to content

Latest commit

 

History

History
426 lines (313 loc) · 11.7 KB

File metadata and controls

426 lines (313 loc) · 11.7 KB

Security Testing Examples

⚠️ ETHICAL USE AND RESPONSIBLE DISCLOSURE ONLY ⚠️

Critical Warning

These examples are provided EXCLUSIVELY for:

  • ✅ Authorized penetration testing with written permission
  • ✅ Defensive security research in controlled environments
  • ✅ Security awareness training programs
  • ✅ Development and testing of security tools
  • ✅ Academic research with proper ethical approval
  • ✅ Red team exercises within your own organization
  • ✅ Compliance testing for regulatory requirements

NEVER use these examples for:

  • ❌ Unauthorized access to systems or networks
  • ❌ Attacking systems without explicit written permission
  • ❌ Malicious activities of any kind
  • ❌ Testing third-party systems without authorization
  • ❌ Violating computer fraud and abuse laws
  • ❌ Bypassing security controls on production systems
  • ❌ Any illegal or unethical activities

Legal Disclaimer

YOU ARE SOLELY RESPONSIBLE FOR YOUR ACTIONS

Using these tools and examples against systems you don't own or don't have explicit authorization to test is ILLEGAL in most jurisdictions and may violate:

  • Computer Fraud and Abuse Act (CFAA) - USA
  • Computer Misuse Act - UK
  • European Convention on Cybercrime
  • Local and international cybercrime laws

Unauthorized access can result in:

  • Criminal prosecution
  • Civil liability
  • Significant financial penalties
  • Imprisonment

ALWAYS obtain written authorization before conducting security testing.

Overview

This directory contains synthetic security testing data generators using agentic-synth. These tools help security professionals generate realistic test data for defensive security operations, tool development, and training.

Files

1. vulnerability-testing.ts

Generates test data for common web application vulnerabilities:

  • SQL Injection Payloads - Test input validation and parameterized queries
  • XSS Attack Vectors - Validate output encoding and CSP
  • CSRF Test Scenarios - Test token validation and SameSite cookies
  • Authentication Bypass Tests - Validate authentication mechanisms
  • API Abuse Patterns - Test rate limiting and API security controls
  • OWASP Top 10 Tests - Comprehensive vulnerability testing suite

Use Cases:

  • Web application security scanner development
  • WAF (Web Application Firewall) rule testing
  • Security code review training
  • DevSecOps pipeline validation

2. threat-simulation.ts

Generates threat actor behavior simulations:

  • Brute Force Attack Patterns - Test account lockout mechanisms
  • DDoS Traffic Simulation - Validate DDoS mitigation
  • Malware Behavior Patterns - Test EDR/XDR systems
  • Phishing Campaign Data - Security awareness training
  • Insider Threat Scenarios - UBA system validation
  • Zero-Day Exploit Indicators - Threat intelligence testing

Use Cases:

  • SOC analyst training
  • Incident response preparedness
  • Threat detection rule development
  • Security monitoring system validation

3. security-audit.ts

Generates security audit and compliance data:

  • User Access Patterns - Detect privilege escalation
  • Permission Change Audits - Track access control modifications
  • Configuration Change Monitoring - Security-sensitive config tracking
  • Compliance Violation Scenarios - GDPR, HIPAA, PCI-DSS testing
  • Security Event Correlations - SIEM correlation rule testing
  • DLP Audit Data - Data loss prevention policy validation

Use Cases:

  • SIEM and log analysis tool development
  • Compliance reporting automation
  • Security audit automation
  • Insider threat detection system testing

4. penetration-testing.ts

Generates penetration testing datasets:

  • Network Scanning Results - Vulnerability scanner testing
  • Port Enumeration Data - Service identification validation
  • Service Fingerprinting - Version detection testing
  • Exploitation Attempt Logs - Exploit detection system validation
  • Post-Exploitation Activity - Lateral movement detection
  • Pentest Report Data - Reporting system development

Use Cases:

  • Penetration testing tool development
  • Red team exercise planning
  • Security assessment automation
  • Vulnerability management system testing

Installation

# From the monorepo root
npm install

# Or specifically for agentic-synth
cd packages/agentic-synth
npm install

Configuration

Set up your Anthropic API key:

export ANTHROPIC_API_KEY='your-api-key-here'

Or create a .env file in the agentic-synth directory:

ANTHROPIC_API_KEY=your-api-key-here

Usage Examples

Basic Usage

import {
  generateSQLInjectionPayloads,
  generateXSSVectors
} from './security/vulnerability-testing';

// Generate SQL injection test payloads
const sqlPayloads = await generateSQLInjectionPayloads();
console.log(sqlPayloads);

// Generate XSS test vectors
const xssVectors = await generateXSSVectors();
console.log(xssVectors);

Running Complete Test Suites

import { runVulnerabilityTests } from './security/vulnerability-testing';
import { runThreatSimulations } from './security/threat-simulation';
import { runSecurityAudits } from './security/security-audit';
import { runPenetrationTests } from './security/penetration-testing';

// Run all vulnerability tests
const vulnResults = await runVulnerabilityTests();

// Run all threat simulations
const threatResults = await runThreatSimulations();

// Run all security audits
const auditResults = await runSecurityAudits();

// Run all penetration tests
const pentestResults = await runPenetrationTests();

Customizing Generation

import { AgenticSynth } from 'agentic-synth';

const synth = new AgenticSynth({
  temperature: 0.8,  // Higher for more variety
  maxRetries: 3
});

const customData = await synth.generate({
  prompt: 'Generate custom security test data...',
  schema: {
    // Your custom JSON schema
  }
});

Best Practices

1. Authorization First

Before any security testing:

┌─────────────────────────────────────────────┐
│  OBTAIN WRITTEN AUTHORIZATION               │
│                                             │
│  ✓ Scope definition                        │
│  ✓ Time windows                            │
│  ✓ Acceptable techniques                   │
│  ✓ Emergency contacts                      │
│  ✓ Legal review                            │
└─────────────────────────────────────────────┘

2. Controlled Environments

  • Use isolated test networks
  • Deploy honeypots for realistic testing
  • Separate production from testing
  • Implement proper segmentation
  • Monitor all testing activities

3. Responsible Disclosure

If you discover real vulnerabilities:

  1. Do not exploit beyond proof of concept
  2. Document findings professionally
  3. Report to appropriate parties immediately
  4. Follow responsible disclosure timelines
  5. Respect confidentiality agreements

4. Data Handling

  • Never use real user data in tests
  • Sanitize all test data before sharing
  • Encrypt sensitive test artifacts
  • Properly dispose of test data
  • Follow data protection regulations

5. Tool Safety

// Always validate before execution
if (!hasAuthorization()) {
  throw new Error('Unauthorized testing attempt blocked');
}

// Log all activities
logSecurityTestActivity({
  action: 'vulnerability_scan',
  target: authorizedTarget,
  timestamp: new Date(),
  authorization: authorizationId
});

// Implement rate limiting
const rateLimiter = new RateLimiter({
  maxRequestsPerMinute: 10
});

Educational Use

These examples are valuable for:

Security Training

  • Hands-on labs for security courses
  • Certification preparation (CEH, OSCP, etc.)
  • Capture the Flag (CTF) competitions
  • Security awareness programs

Tool Development

  • Building security testing frameworks
  • Creating custom vulnerability scanners
  • Developing SIEM correlation rules
  • Implementing IDS/IPS signatures

Research

  • Security research projects
  • Academic publications
  • Threat modeling exercises
  • Risk assessment frameworks

Security Testing Workflow

1. AUTHORIZATION
   ↓
2. RECONNAISSANCE (Passive)
   ↓
3. SCANNING (Active, if authorized)
   ↓
4. ENUMERATION
   ↓
5. EXPLOITATION (Controlled)
   ↓
6. POST-EXPLOITATION (Limited)
   ↓
7. DOCUMENTATION
   ↓
8. REPORTING
   ↓
9. REMEDIATION SUPPORT
   ↓
10. RE-TESTING

Ethical Guidelines

DO:

✅ Get explicit written permission ✅ Stay within defined scope ✅ Report vulnerabilities responsibly ✅ Protect client confidentiality ✅ Document all activities ✅ Follow industry standards (OWASP, NIST, etc.) ✅ Maintain professional ethics ✅ Provide remediation guidance ✅ Respect privacy and data protection laws

DON'T:

❌ Test without authorization ❌ Exceed defined scope ❌ Cause damage or disruption ❌ Access or exfiltrate real data ❌ Share findings publicly without permission ❌ Use discoveries for personal gain ❌ Ignore responsible disclosure procedures ❌ Test in production without approval ❌ Bypass security controls unnecessarily

Compliance Considerations

When generating test data for compliance testing:

GDPR (General Data Protection Regulation)

  • Use synthetic data only
  • Don't process real personal data
  • Document data processing activities
  • Implement data minimization
  • Ensure right to erasure

HIPAA (Health Insurance Portability and Accountability Act)

  • Never use real PHI (Protected Health Information)
  • Test with synthetic medical data only
  • Ensure encryption at rest and in transit
  • Document all security testing activities
  • Maintain audit logs

PCI-DSS (Payment Card Industry Data Security Standard)

  • Never test with real cardholder data
  • Use test card numbers only
  • Implement network segmentation
  • Conduct quarterly vulnerability scans
  • Perform annual penetration tests

Support and Resources

Official Resources

Community

  • OWASP Local Chapters
  • DEF CON Groups
  • SANS Internet Storm Center
  • Bugcrowd and HackerOne forums

Training

Contributing

When contributing security testing examples:

  1. Ensure ethical use - All examples must be defensive
  2. Include warnings - Clear ethical use statements
  3. Document thoroughly - Explain intended use cases
  4. Test safely - Validate in isolated environments
  5. Review carefully - Security team approval required

License

These examples are provided for educational and authorized testing purposes only. Users are solely responsible for ensuring compliance with all applicable laws and regulations.


Final Reminder

🚨 CRITICAL 🚨

UNAUTHORIZED COMPUTER ACCESS IS A CRIME

These tools are powerful and must be used responsibly. The line between ethical hacking and criminal activity is authorization. Always obtain explicit written permission before conducting any security testing.

When in doubt, don't test. Ask first.


Generated using agentic-synth - Synthetic data for ethical security testing

Remember: With great power comes great responsibility. Use these tools wisely.