Full security platform with web dashboard, 16 Flask blueprints, 26 modules, autonomous AI agent, WebUSB hardware support, and Archon Android companion app. Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
120 lines
3.4 KiB
JSON
120 lines
3.4 KiB
JSON
{
|
|
"session_id": "192_168_1_100_20260127_202421",
|
|
"target": "192.168.1.100",
|
|
"state": "running",
|
|
"created_at": "2026-01-27T20:24:21.604010",
|
|
"updated_at": "2026-01-27T20:24:21.604098",
|
|
"notes": "",
|
|
"step_count": 0,
|
|
"tree": {
|
|
"target": "192.168.1.100",
|
|
"created_at": "2026-01-27T20:24:21.604003",
|
|
"updated_at": "2026-01-27T20:24:21.604091",
|
|
"root_nodes": [
|
|
"4be13ed9",
|
|
"8dc38740",
|
|
"22ee2768",
|
|
"2c45477f",
|
|
"6f793ae8",
|
|
"778fc896"
|
|
],
|
|
"nodes": {
|
|
"4be13ed9": {
|
|
"id": "4be13ed9",
|
|
"label": "Reconnaissance",
|
|
"node_type": "reconnaissance",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Information gathering and target enumeration",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 1,
|
|
"created_at": "2026-01-27T20:24:21.604032",
|
|
"updated_at": "2026-01-27T20:24:21.604032"
|
|
},
|
|
"8dc38740": {
|
|
"id": "8dc38740",
|
|
"label": "Initial Access",
|
|
"node_type": "initial_access",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Gaining initial foothold on target",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 2,
|
|
"created_at": "2026-01-27T20:24:21.604044",
|
|
"updated_at": "2026-01-27T20:24:21.604044"
|
|
},
|
|
"22ee2768": {
|
|
"id": "22ee2768",
|
|
"label": "Privilege Escalation",
|
|
"node_type": "privilege_escalation",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Escalating from initial access to higher privileges",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 3,
|
|
"created_at": "2026-01-27T20:24:21.604056",
|
|
"updated_at": "2026-01-27T20:24:21.604056"
|
|
},
|
|
"2c45477f": {
|
|
"id": "2c45477f",
|
|
"label": "Lateral Movement",
|
|
"node_type": "lateral_movement",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Moving to other systems in the network",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 4,
|
|
"created_at": "2026-01-27T20:24:21.604066",
|
|
"updated_at": "2026-01-27T20:24:21.604066"
|
|
},
|
|
"6f793ae8": {
|
|
"id": "6f793ae8",
|
|
"label": "Credential Access",
|
|
"node_type": "credential_access",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Obtaining credentials and secrets",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 3,
|
|
"created_at": "2026-01-27T20:24:21.604077",
|
|
"updated_at": "2026-01-27T20:24:21.604077"
|
|
},
|
|
"778fc896": {
|
|
"id": "778fc896",
|
|
"label": "Persistence",
|
|
"node_type": "persistence",
|
|
"status": "todo",
|
|
"parent_id": null,
|
|
"children": [],
|
|
"details": "Maintaining access to compromised systems",
|
|
"tool_output": null,
|
|
"findings": [],
|
|
"priority": 5,
|
|
"created_at": "2026-01-27T20:24:21.604088",
|
|
"updated_at": "2026-01-27T20:24:21.604088"
|
|
}
|
|
}
|
|
},
|
|
"events": [
|
|
{
|
|
"timestamp": "2026-01-27T20:24:21.604098",
|
|
"event_type": "state_change",
|
|
"data": {
|
|
"from": "idle",
|
|
"to": "running"
|
|
}
|
|
}
|
|
],
|
|
"findings": [],
|
|
"pipeline_history": []
|
|
} |