Full security platform with web dashboard, 16 Flask blueprints, 26 modules, autonomous AI agent, WebUSB hardware support, and Archon Android companion app. Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
120 lines
3.4 KiB
JSON
120 lines
3.4 KiB
JSON
{
|
|
"session_id": "192_168_50_78_20260130_133833",
|
|
"target": "192.168.50.78",
|
|
"state": "running",
|
|
"created_at": "2026-01-30T13:38:33.830336",
|
|
"updated_at": "2026-01-30T13:38:33.830464",
|
|
"notes": "",
|
|
"step_count": 0,
|
|
"tree": {
|
|
"target": "192.168.50.78",
|
|
"created_at": "2026-01-30T13:38:33.830323",
|
|
"updated_at": "2026-01-30T13:38:33.830460",
|
|
"root_nodes": [
|
|
"e4c40c28",
|
|
"ddd63828",
|
|
"b3f2634d",
|
|
"9c162c78",
|
|
"aa40d5a3",
|
|
"0c50a23d"
|
|
],
|
|
"nodes": {
|
|
"e4c40c28": {
|
|
"id": "e4c40c28",
|
|
"label": "Reconnaissance",
|
|
"node_type": "reconnaissance",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Information gathering and target enumeration",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 1,
|
|
"created_at": "2026-01-30T13:38:33.830390",
|
|
"updated_at": "2026-01-30T13:38:33.830390"
|
|
},
|
|
"ddd63828": {
|
|
"id": "ddd63828",
|
|
"label": "Initial Access",
|
|
"node_type": "initial_access",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Gaining initial foothold on target",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 2,
|
|
"created_at": "2026-01-30T13:38:33.830408",
|
|
"updated_at": "2026-01-30T13:38:33.830408"
|
|
},
|
|
"b3f2634d": {
|
|
"id": "b3f2634d",
|
|
"label": "Privilege Escalation",
|
|
"node_type": "privilege_escalation",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Escalating from initial access to higher privileges",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 3,
|
|
"created_at": "2026-01-30T13:38:33.830421",
|
|
"updated_at": "2026-01-30T13:38:33.830421"
|
|
},
|
|
"9c162c78": {
|
|
"id": "9c162c78",
|
|
"label": "Lateral Movement",
|
|
"node_type": "lateral_movement",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Moving to other systems in the network",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 4,
|
|
"created_at": "2026-01-30T13:38:33.830433",
|
|
"updated_at": "2026-01-30T13:38:33.830433"
|
|
},
|
|
"aa40d5a3": {
|
|
"id": "aa40d5a3",
|
|
"label": "Credential Access",
|
|
"node_type": "credential_access",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Obtaining credentials and secrets",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 3,
|
|
"created_at": "2026-01-30T13:38:33.830445",
|
|
"updated_at": "2026-01-30T13:38:33.830445"
|
|
},
|
|
"0c50a23d": {
|
|
"id": "0c50a23d",
|
|
"label": "Persistence",
|
|
"node_type": "persistence",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Maintaining access to compromised systems",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 5,
|
|
"created_at": "2026-01-30T13:38:33.830457",
|
|
"updated_at": "2026-01-30T13:38:33.830457"
|
|
}
|
|
}
|
|
},
|
|
"events": [
|
|
{
|
|
"timestamp": "2026-01-30T13:38:33.830464",
|
|
"event_type": "state_change",
|
|
"data": {
|
|
"from": "idle",
|
|
"to": "running"
|
|
}
|
|
}
|
|
],
|
|
"findings": [],
|
|
"pipeline_history": []
|
|
} |