Simulation environment for attacks on computer networks
You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Thorsten Sick de5fc486d1 code simplification 3 years ago
app code simplification 3 years ago
doc Renaming demo.yaml to template.yaml 4 years ago
plugins improved documentation 3 years ago
systems attacker and target 3 working properly in vagrant 4 years ago
tests Full unit test coverage for config.py 4 years ago
tools Caldera experiments can be independently controlled by files. Those will overwrite the caldera attacks in the experiment files. Good for batch processing 4 years ago
.gitignore Initial update 4 years ago
CONTRIBUTING.txt Basic contribution files added 4 years ago
CONTRIBUTORS.txt Basic contribution files added 4 years ago
Makefile Added a change lot to shipit. Based on Git log 4 years ago
README.md Initial update 4 years ago
caldera_control.py PEP8 fixes 4 years ago
caldera_subset_classic.txt Caldera experiments can be independently controlled by files. Those will overwrite the caldera attacks in the experiment files. Good for batch processing 4 years ago
experiment_control.py Caldera experiments can be independently controlled by files. Those will overwrite the caldera attacks in the experiment files. Good for batch processing 4 years ago
init.sh Documentation can be built now 4 years ago
machine_control.py Simpler access to machine data 2 4 years ago
metasploit_control.py basic functionality for metasploit working as POC 3 years ago
plugin_manager.py added verbosity switch 4 years ago
pylint.rc Added pylint rc 4 years ago
requirements.txt Adding first metasploit steps for FIN7 4 years ago
requirements_dev.txt Documentation can be built now 4 years ago
setup.py Unit tests working now 4 years ago
template.yaml Caldera now supports jitter and obfuscator from configuration file. Keep in mind: Not all implants support all obfuscators. 4 years ago
tox.ini Unit tests working now 4 years ago

README.md

Creates vulnerable systems

Uses vagrant to set up vulnerable systems. Sensors and maybe attack agents will be installed as well.

Will use vagrant config. It is quite likely that it we will need some parameters to create similar but not identical systems.

Testing

Prerequisites:

Install python environment, e.g. using conda:

conda create -n purpledome python=3.8
conda activate purpledome

Then install the required dependencies in the crated python environment:

pip install -r requirements.txt

Call test suite:

make test

Documentation

Documentation is using sphinx

https://www.sphinx-doc.org/en/master/index.html

Generate it switching to the directory doc and calling

make all