ATTACKBED
Installation
1. Overview
2. Requirements
3. Prepare repository
4. Configure access to openstack
4.1. Activate the configuration
5. Setting up a python virtual environment
5.1. (Optional) Installing Ansible in the virtual environment
6. Deploy server images
6.1. Download and install base images
6.2. Download and install server images
6.3. Build server images manually
7. Deploy bootstrap
8. Deploy log pipeline
8.1. Architecture
8.2. Configuration
8.3. Deployment
9. Deploy scenario
Tools
Testbedrun
Using the
testbedrun
Script
Arguments
Input YAML File Format
Workflow
Example Command
MITRE Technique & Tactic Counter
Installation
Usage
Arguments
Output
Example
Scenarios
Overview
Prepare Ansible
Run Attacks
Gather Logs
Videoserver (Scenario 1)
Attacker Steps:
Linux Malware (Scenario 2)
Attacker Steps:
Lateral Movement (Scenario 3)
Attacker Steps:
Network (Scenario 4)
Attacker Steps:
LAN Turtle (Scenario 5)
Attacker Steps:
Client (Scenario 6)
Attacker Steps:
Development
Overview
Purpose
Project Structure
Getting Started with Development
Contributing
Attacker Services and Ports
Scenario Usage
Firewall Connections Per Scenario
Firewall Zones and Policies Overview
Scenario Connections
ATTACKBED
Index
Index