Simulation environment for attacks on computer networks
You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Thorsten Sick 8025dbcd67 Simplified sensor plugins, round 2 4 years ago
app Simplified sensor plugins, round 2 4 years ago
doc Renaming demo.yaml to template.yaml 4 years ago
plugins Simplified sensor plugins, round 2 4 years ago
systems
tests Added bug with partial attack configs (kali or caldera) in yaml file 4 years ago
tools Simplified sensor plugins, round 2 4 years ago
.gitignore
CONTRIBUTING.txt Basic contribution files added 4 years ago
CONTRIBUTORS.txt Basic contribution files added 4 years ago
Makefile Added a change lot to shipit. Based on Git log 4 years ago
README.md
caldera_control.py Code cleanup. Removed TODOs 4 years ago
experiment_control.py Simplified sensor plugins, round 2 4 years ago
init.sh
machine_control.py
plugin_manager.py Added default config for plugins 4 years ago
pylint.rc
requirements.txt
requirements_dev.txt
setup.py
template.yaml Renaming demo.yaml to template.yaml 4 years ago
tox.ini

README.md

Creates vulnerable systems

Uses vagrant to set up vulnerable systems. Sensors and maybe attack agents will be installed as well.

Will use vagrant config. It is quite likely that it we will need some parameters to create similar but not identical systems.

Testing

Prerequisites:

Install python environment, e.g. using conda:

conda create -n purpledome python=3.8
conda activate purpledome

Then install the required dependencies in the crated python environment:

pip install -r requirements.txt

Call test suite:

make test

Documentation

Documentation is using sphinx

https://www.sphinx-doc.org/en/master/index.html

Generate it switching to the directory doc and calling

make all