ATTACKBED
Installation
1. Overview
2. Requirements
3. Prepare repository
4. Configure access to openstack
4.1. Activate the configuration
5. Setting up a python virtual environment
5.1. (Optional) Installing Ansible in the virtual environment
6. Deploy server images
6.1. Download and install base images
6.2. Download and install server images
6.3. Build server images manually
7. Deploy bootstrap
8. Deploy log pipeline
8.1. Architecture
8.2. Configuration
8.3. Deployment
9. Deploy scenario
Scenarios
Overview
Prepare Ansible
Run Attacks
Gather Logs
Videoserver (Scenario1)
Attacker Steps:
Linux Malware (Scenario2)
Attacker Steps:
Lateral Movement (Scenario 3)
Attacker Steps:
Network (Scenario 4)
Attacker Steps:
LAN Turtle (Scenario 5)
Attacker Steps:
ATTACKBED
AttackBed Documenation
View page source
AttackBed Documenation
Installation
1. Overview
2. Requirements
3. Prepare repository
4. Configure access to openstack
4.1. Activate the configuration
5. Setting up a python virtual environment
5.1. (Optional) Installing Ansible in the virtual environment
6. Deploy server images
6.1. Download and install base images
6.2. Download and install server images
6.3. Build server images manually
7. Deploy bootstrap
8. Deploy log pipeline
8.1. Architecture
8.2. Configuration
8.3. Deployment
9. Deploy scenario
Scenarios
Overview
Run Attacks
Gather Logs
Videoserver (Scenario1)
Linux Malware (Scenario2)
Lateral Movement (Scenario 3)
Network (Scenario 4)
LAN Turtle (Scenario 5)