Simulation environment for attacks on computer networks
You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Thorsten Sick d25676032e Documentation can be built now 3 years ago
app Documentation can be built now 3 years ago
doc Initial update 3 years ago
plugins/base Documentation can be built now 3 years ago
.gitignore Initial update 3 years ago
Makefile Documentation can be built now 3 years ago
README.md Initial update 3 years ago
caldera_control.py Documentation can be built now 3 years ago
experiment.yaml Documentation can be built now 3 years ago
experiment_control.py Documentation can be built now 3 years ago
init.sh Documentation can be built now 3 years ago
machine_control.py Documentation can be built now 3 years ago
requirements.txt Documentation can be built now 3 years ago
requirements_dev.txt Documentation can be built now 3 years ago

README.md

Creates vulnerable systems

Uses vagrant to set up vulnerable systems. Sensors and maybe attack agents will be installed as well.

Will use vagrant config. It is quite likely that it we will need some parameters to create similar but not identical systems.

Testing

Prerequisites:

Install python environment, e.g. using conda:

conda create -n purpledome python=3.8
conda activate purpledome

Then install the required dependencies in the crated python environment:

pip install -r requirements.txt

Call test suite:

make test

Documentation

Documentation is using sphinx

https://www.sphinx-doc.org/en/master/index.html

Generate it switching to the directory doc and calling

make all